Sciweavers

157 search results - page 13 / 32
» Presenting Proofs with Adapted Granularity
Sort
View
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 7 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
ICASSP
2011
IEEE
12 years 11 months ago
On gradient type adaptive filters with non-symmetric matrix step-sizes
—In this contribution we provide a thorough stability analysis of gradient type algorithms with non-symmetric matrix step-sizes. We hereby extend existing analyses for symmetric ...
Markus Rupp
DEXAW
2005
IEEE
128views Database» more  DEXAW 2005»
14 years 1 months ago
An Ontology-Based Architecture for Service Discovery and Advice System
In this paper we present a novel, ontology-based approach to service discovery, which exploits domain knowledge and semantic service descriptions to guide the service discovery pr...
Devis Bianchini, Valeria De Antonellis, Michele Me...
FOAL
2009
ACM
14 years 2 months ago
A type system for functional traversal-based aspects
We present a programming language model of the ideas behind Functional Adaptive Programming (AP-F) and our Java implementation, DemeterF. Computation in AP-F is encapsulated in se...
Bryan Chadwick, Karl J. Lieberherr
VTC
2008
IEEE
14 years 1 months ago
Resource Allocation and Control Signaling in the WINNER Flexible MAC Concept
—The EU WINNER projects have studied OFDM-based packet data systems beyond 3G that use adaptivity on all timescales to obtain high flexibility and performance. The adaptive trans...
Mikael Sternad, Tommy Svensson, Martin Döttli...