Sciweavers

2421 search results - page 99 / 485
» Message from the Editor-in-Chief
Sort
View
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
14 years 7 days ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
IADIS
2004
13 years 11 months ago
SMS transmission using PDU mode and 7-bit coding scheme
This paper describes the design and implementation of an SMS transmission system using the PDU (Protocol Data Unit) mode of a GSM (Global System for Mobile Communications) modem. ...
Andrés Ortiz, Alberto Prieto
ATAL
2010
Springer
13 years 11 months ago
Improving DPOP with function filtering
DPOP is an algorithm for distributed constraint optimization which has, as main drawback, the exponential size of some of its messages. Recently, some algorithms for distributed c...
Ismel Brito, Pedro Meseguer
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 10 months ago
On Termination for Faulty Channel Machines
A channel machine consists of a finite controller together with several fifo channels; the controller can read messages from the head of a channel and write messages to the tail of...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...
CORR
2007
Springer
74views Education» more  CORR 2007»
13 years 10 months ago
Parity Forwarding for Multiple-Relay Networks
—This paper proposes a relaying strategy for the multiple-relay network in which each relay decodes a selection of transmitted messages by other transmitting terminals, and forwa...
Peyman Razaghi, Wei Yu