Sciweavers

628 search results - page 30 / 126
» Designing the perfect auction
Sort
View
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 10 months ago
Spectrum of Sizes for Perfect Deletion-Correcting Codes
One peculiarity with deletion-correcting codes is that perfect t-deletion-correcting codes of the same length over the same alphabet can have different numbers of codewords, becaus...
Yeow Meng Chee, Gennian Ge, Alan C. H. Ling
ACNS
2006
Springer
92views Cryptology» more  ACNS 2006»
14 years 3 months ago
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
The visual secret sharing (VSS for short) scheme is a secret image sharing scheme. A secret image is visually revealed from overlapping shadow images without additional computation...
Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
JCSS
2006
102views more  JCSS 2006»
13 years 9 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
SIAMAM
2011
13 years 4 months ago
Imaging Schemes for Perfectly Conducting Cracks
We consider the problem of locating perfectly conducting cracks and estimating their geometric features from multi-static response matrix measurements at a single or multiple frequ...
Habib Ammari, Josselin Garnier, Hyeonbae Kang, Won...
IPPS
2002
IEEE
14 years 2 months ago
Supporting Co-Allocation in an Auctioning-Based Resource Allocator for Grid Systems
In this paper, we present the overall design for an auctioning based resource trading/acquiring system that can be deployed in wide-area computing systems such as Grid systems. Se...
Chunming Chen, Muthucumaru Maheswaran, Michel Toul...