Sciweavers

1763 search results - page 132 / 353
» Dependent random choice
Sort
View
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
14 years 1 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
SCAM
2003
IEEE
14 years 1 months ago
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques
Many static analyses aim at assigning to each control point of a program an invariant property that characterizes any state of a trace corresponding to this point. The choice of t...
Matthieu Martel
GW
2003
Springer
109views Biometrics» more  GW 2003»
14 years 1 months ago
Deixis in Multimodal Human Computer Interaction: An Interdisciplinary Approach
Focusing on deixis in human computer interaction this paper presents interdisciplinary work on the use of co-verbal gesture . Empirical investigations, theoretical modeling, and co...
Alfred Kranstedt, Peter Kühnlein, Ipke Wachsm...
IFIP
2003
Springer
14 years 1 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
IWCMC
2010
ACM
14 years 1 months ago
Turbo packet combining techniques for multi-relay-assisted systems over multi-antenna broadband channels
This paper focuses on turbo packet combining techniques for multi-relay-assisted systems operating over multiple-input multiple-output (MIMO) broadband channel. Two packet combini...
Houda Chafnaji, Halim Yanikomeroglu, Tarik Ait-Idi...