Sciweavers

943 search results - page 140 / 189
» Compressed channel sensing
Sort
View
CCS
2000
ACM
14 years 11 hour ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
14 years 9 hour ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
SIGCOMM
1997
ACM
13 years 12 months ago
Solutions to Hidden Terminal Problems in Wireless Networks
The floor acquisition multiple access (FAMA) discipline is analyzed in networks with hidden terminals. According to FAMA, control of the channel (the floor) is assigned to at mo...
Chane L. Fullmer, J. J. Garcia-Luna-Aceves
INFOCOM
2010
IEEE
13 years 6 months ago
Opportunistic Spectrum Access with Multiple Users: Learning under Competition
Abstract—The problem of cooperative allocation among multiple secondary users to maximize cognitive system throughput is considered. The channel availability statistics are initi...
Animashree Anandkumar, Nithin Michael, Ao Tang
IPSN
2010
Springer
14 years 23 days ago
Ear-phone: an end-to-end participatory urban noise mapping system
A noise map facilitates monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigat...
Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere...