Sciweavers

3379 search results - page 360 / 676
» Powers of Two
Sort
View
JCS
2011
156views more  JCS 2011»
14 years 11 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
PE
2011
Springer
365views Optimization» more  PE 2011»
14 years 11 months ago
Optimal resource allocation for time-reservation systems
This paper studies the optimal resource allocation in time-reservation systems. Customers arrive at a service facility and receive service in two steps; in the first step informa...
Ran Yang, Sandjai Bhulai, Rob van der Mei, Frank J...
TVCG
2011
119views more  TVCG 2011»
14 years 11 months ago
Toward High-Quality Gradient Estimation on Regular Lattices
—In this paper, we present two methods for accurate gradient estimation from scalar field data sampled on regular lattices. The first method is based on the multidimensional Tayl...
Zahid Hossain, Usman R. Alim, Torsten Möller
EJWCN
2010
97views more  EJWCN 2010»
14 years 11 months ago
Analysis and Construction of Full-Diversity Joint Network-LDPC Codes for Cooperative Communications
Abstract--Transmit diversity is necessary in harsh environments to reduce the required transmit power for achieving a given error performance at a certain transmission rate. In net...
Dieter Duyck, Daniele Capirone, Joseph Jean Boutro...
TWC
2010
14 years 11 months ago
Performance of asynchronous two-relay two-hop wireless cooperative networks
In wireless cooperative networks, the asynchronism between the relays can be a source of diversity which is similar in its essence to the multipath diversity of frequency selectiv...
Michel Nahas, Ahmed Saadani, Walid Hachem