Sciweavers

14783 search results - page 2831 / 2957
» Quantum Information Processing
Sort
View
FOCS
2006
IEEE
15 years 8 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...
132
Voted
GLOBECOM
2006
IEEE
15 years 8 months ago
Low-Complexity Turbo Equalization for Alamouti Space-Time Block Coded EDGE Systems
— Enhanced Data Rates for Global Evolution (EDGE) based systems are expected to facilitate the same services as third generation WCDMA systems. This goal is achieved through phys...
K. C. B. Wavegedara, Vijay K. Bhargava
IAT
2006
IEEE
15 years 8 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
109
Voted
ICMCS
2006
IEEE
113views Multimedia» more  ICMCS 2006»
15 years 8 months ago
On Parallelization of a Video Mining System
As digital video data becomes more pervasive, mining information from multimedia data becomes increasingly important. Although researches in multimedia mining area have shown grea...
Wenlong Li, Eric Li, Nan Di, Carole Dulong, Tao Wa...
122
Voted
ICRA
2006
IEEE
119views Robotics» more  ICRA 2006»
15 years 8 months ago
Outdoor SLAM using Visual Appearance and Laser Ranging
— This paper describes a 3D SLAM system using information from an actuated laser scanner and camera installed on a mobile robot.The laser samples the local geometry of the enviro...
Paul M. Newman, David M. Cole, Kin Leong Ho
« Prev « First page 2831 / 2957 Last » Next »