Sciweavers

231 search results - page 41 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
CCS
2004
ACM
14 years 28 days ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
PIMRC
2008
IEEE
14 years 1 months ago
Multihop-enabled orthogonalization in Distributed MIMO Networks
—It has recently been proposed to orthogonalize the data streams of n interfering source-destination pairs by employing an intermediate stage of non-cooperating coherent amplify-...
Jörg Wagner, Marc Kuhn, Armin Wittneben
LREC
2010
173views Education» more  LREC 2010»
13 years 9 months ago
Transcriber Driving Strategies for Transcription Aid System
Speech recognition technology suffers from a lack of robustness which limits its usability for fully automated speech-to-text transcription, and manual correction is generally req...
Grégory Senay, Georges Linares, Benjamin Le...
WISEC
2010
ACM
14 years 26 days ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
CSE
2009
IEEE
14 years 2 months ago
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals
—In this paper we present a design methodology for the identification and development of a suitable hardware platform (including dedicated hardware accelerators) for the data pl...
Sebastian Hessel, David Szczesny, Shadi Traboulsi,...