Sciweavers

2340 search results - page 409 / 468
» Data abstraction and information hiding
Sort
View
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
TSP
2008
76views more  TSP 2008»
13 years 7 months ago
Eigenvalue Beamforming Using a Multirank MVDR Beamformer and Subspace Selection
Abstract--We derive eigenvalue beamformers to resolve an unknown signal of interest whose spatial signature lies in a known subspace, but whose orientation in that subspace is othe...
Ali Pezeshki, B. D. Van Veen, Louis L. Scharf, H. ...
TSP
2008
103views more  TSP 2008»
13 years 7 months ago
Distributed Adaptive Quantization for Wireless Sensor Networks: From Delta Modulation to Maximum Likelihood
Abstract-- We consider distributed parameter estimation using quantized observations in wireless sensor networks where due to bandwidth constraint, each sensor quantizes its local ...
Jun Fang, Hongbin Li
ALGORITHMICA
1999
84views more  ALGORITHMICA 1999»
13 years 7 months ago
Computational Approaches to Drug Design
Abstract. The rational approach to pharmaceutical drug design begins with an investigation of the relationship between chemical structure and biological activity. Information gaine...
Paul W. Finn, Lydia E. Kavraki
VLSISP
2002
123views more  VLSISP 2002»
13 years 7 months ago
Monte Carlo Bayesian Signal Processing for Wireless Communications
Abstract. Many statistical signal processing problems found in wireless communications involves making inference about the transmitted information data based on the received signal...
Xiaodong Wang, Rong Chen, Jun S. Liu