Sciweavers

886 search results - page 10 / 178
» Generalized Bezout Identity
Sort
View
ICC
2008
IEEE
148views Communications» more  ICC 2008»
14 years 2 months ago
Analysis of Differential Unitary Space-Time Modulation over Non-Identical MIMO Channels
Abstract— We present an analytical study on the error performance of differential unitary space-time modulation (DUSTM) over multiple-input multiple-output (MIMO) channels with n...
Meixia Tao
UIST
2005
ACM
14 years 1 months ago
DT controls: adding identity to physical interfaces
In this paper, we show how traditional physical interface components such as switches, levers, knobs and touch screens can be easily modified to identify who is activating each co...
Paul H. Dietz, Bret Harsham, Clifton Forlines, Dar...
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 1 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
UAI
2008
13 years 9 months ago
Multi-View Learning over Structured and Non-Identical Outputs
In many machine learning problems, labeled training data is limited but unlabeled data is ample. Some of these problems have instances that can be factored into multiple views, ea...
Kuzman Ganchev, João Graça, John Bli...
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...