Sciweavers

112 search results - page 10 / 23
» Improved Methods to Perform Threshold RSA
Sort
View
DCC
2009
IEEE
14 years 8 months ago
Communicating the Difference of Correlated Gaussian Sources over a MAC
This paper considers the problem of transmitting the difference of two positively correlated Gaussian sources over a two-user additive Gaussian noise multiple access channel (MAC)...
Rajiv Soundararajan, Sriram Vishwanath
TSP
2008
124views more  TSP 2008»
13 years 7 months ago
Dictionary Preconditioning for Greedy Algorithms
This article introduces the concept of sensing dictionaries. It presents an alteration of greedy algorithms like thresholding or (Orthogonal) Matching Pursuit which improves their...
Karin Schnass, Pierre Vandergheynst
GI
2004
Springer
14 years 23 days ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner
IJVR
2007
72views more  IJVR 2007»
13 years 7 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...
ESWS
2009
Springer
14 years 1 months ago
Improving Ontology Matching Using Meta-level Learning
Despite serious research efforts, automatic ontology matching still suffers from severe problems with respect to the quality of matching results. Existing matching systems trade-of...
Kai Eckert, Christian Meilicke, Heiner Stuckenschm...