Sciweavers

76 search results - page 11 / 16
» Practical Constructions to Multiple Designated Confirmer Sig...
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks
—In this paper, we study the problem of constructing full-coverage three dimensional networks with multiple connectivity. We design a set of patterns for full coverage and two re...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
TIT
1998
105views more  TIT 1998»
13 years 7 months ago
Diversity Waveform Sets for Delay-Doppler Imaging
Abstract— Properties of the ambiguity function and the uncertainty relation of Fourier transforms assert fundamental limitations on the ability of any single radar waveform of co...
Jiann-Ching Guey, Mark R. Bell
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
MOBIHOC
2005
ACM
14 years 7 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
SIGSOFT
2008
ACM
14 years 8 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde