Sciweavers

214 search results - page 15 / 43
» Perfect and Almost Perfect Sequences
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu
ICC
2008
IEEE
140views Communications» more  ICC 2008»
14 years 2 months ago
Relay Selection in Dual-Hop Transmission Systems: Selection Strategies and Performance Results
— We address the problem of selecting an appropriate relay station for forwarding data from a source to a destination node in dual-hop communication systems. In this regard, we f...
Andreas Müller, Joachim Speidel
CCS
2007
ACM
14 years 1 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
PKC
2007
Springer
160views Cryptology» more  PKC 2007»
14 years 1 months ago
Anonymous Signatures Made Easy
Abstract. At PKC 2006, Yang, Wong, Deng and Wang proposed the notion of anonymous signature schemes where signatures do not reveal the signer’s identity, as long as some parts of...
Marc Fischlin
CG
2006
Springer
13 years 11 months ago
A Skat Player Based on Monte-Carlo Simulation
We apply Monte Carlo simulation and alpha-beta search to the card game of Skat, which is similar to Bridge, but different enough to require some new algorithmic ideas besides the t...
Sebastian Kupferschmid, Malte Helmert