Sciweavers

1747 search results - page 37 / 350
» Long Range Dependence
Sort
View
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 10 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
EJWCN
2011
133views more  EJWCN 2011»
13 years 5 months ago
CARNIVORE: A Disruption-Tolerant System for Studying Wildlife
—This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-tocatch/observe wildlife in their natural habitat. CARNIVORE consists of a...
Matthew Rutishauser, Vladislav Petkov, Jay Boice, ...
ICN
2007
Springer
14 years 4 months ago
Distance-Dependent RED Policy (DDRED)
— The network quality of service (QoS) and the congestion control of the transport protocol are important parameters for the performance of a network data transfer. To this end, ...
Sebastien Linck, Eugen Dedu, François Spies
COMPGEOM
2009
ACM
14 years 4 months ago
Cache-oblivious range reporting with optimal queries requires superlinear space
We consider a number of range reporting problems in two and three dimensions and prove lower bounds on the amount of space used by any cache-oblivious data structure for these pro...
Peyman Afshani, Chris H. Hamilton, Norbert Zeh
TOG
2008
102views more  TOG 2008»
13 years 10 months ago
Fluorescent immersion range scanning
The quality of a 3D range scan should not depend on the surface properties of the object. Most active range scanning techniques, however, assume a diffuse reflector to allow for a...
Matthias B. Hullin, Martin Fuchs, Ivo Ihrke, Hans-...