Sciweavers

5344 search results - page 1046 / 1069
» Privacy-Preserving Set Operations
Sort
View
TSP
2008
87views more  TSP 2008»
13 years 9 months ago
Interference Suppression for Memoryless Nonlinear Multiuser Systems Using Constellation Structure
A generalized concept of interference suppression is introduced for multiuser systems with a known memoryless transmit non-linearity, such as in the downlink amplifier of a satelli...
Ananya Sen Gupta, Andrew Singer
JSS
2007
121views more  JSS 2007»
13 years 9 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
ALGORITHMICA
2004
111views more  ALGORITHMICA 2004»
13 years 9 months ago
Non-Clairvoyant Scheduling for Minimizing Mean Slowdown
We consider the problem of scheduling dynamically arriving jobs in a non-clairvoyant setting, that is, when the size of a job in remains unknown until the job finishes execution. ...
Nikhil Bansal, Kedar Dhamdhere, Jochen Könema...
JUCS
2007
90views more  JUCS 2007»
13 years 9 months ago
High-level Structured Interactive Programs with Registers and Voices
Abstract: A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, pro...
Alexandru Popa, Alexandru Sofronia, Gheorghe Stefa...
TWC
2008
154views more  TWC 2008»
13 years 9 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
« Prev « First page 1046 / 1069 Last » Next »