Sciweavers

648 search results - page 98 / 130
» Lowness for Demuth Randomness
Sort
View
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 11 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 11 months ago
Writing on Dirty Paper with Resizing and its Application to Quasi-Static Fading Broadcast Channels
— This paper studies a variant of the classical problem of “writing on dirty paper” in which the sum of the input and the interference, or dirt, is multiplied by a random var...
Wenyi Zhang, Shivaprasad Kotagiri, J. Nicholas Lan...
JUCS
2006
107views more  JUCS 2006»
13 years 11 months ago
Testing Membership in Formal Languages Implicitly Represented by Boolean Functions
Abstract: Combinatorial property testing, initiated formally by Goldreich, Goldwasser, and Ron in [Goldreich et al. (1998)] and inspired by Rubinfeld and Sudan in [Rubinfeld and Su...
Beate Bollig
MONET
2006
141views more  MONET 2006»
13 years 11 months ago
An Energy-Optimal Algorithm for Neighbor Discovery in Wireless Sensor Networks
We consider sensor networks in which individual nodes with on-board sensing and low-power transmitters and receivers establish connections with neighboring nodes. The overall objec...
Ritesh Madan, Sanjay Lall
SMA
2008
ACM
110views Solid Modeling» more  SMA 2008»
13 years 11 months ago
Probabilistic model of triangulation
This paper analyses the probability that randomly deployed sensor nodes triangulate any point within the target area. Its major result is the probability of triangulation for any p...
Xiaoyun Li, David K. Hunter