Sciweavers

224 search results - page 31 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Documenting and automating collateral evolutions in linux device drivers
The internal libraries of Linux are evolving rapidly, to address new requirements and improve performance. These evolutions, however, entail a massive problem of collateral evolut...
Yoann Padioleau, Julia L. Lawall, René Rydh...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
How Should We Solve Search Problems Privately?
Abstract. Secure multiparty computation allows a group of distrusting parties to jointly compute a (possibly randomized) function of their inputs. However, it is often the case tha...
Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinre...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 1 months ago
On Generating Soft Outputs for Lattice-Reduction-Aided MIMO Detection
— Lattice Reduction (LR) aided MIMO detection has been shown to provide near-optimal hard outputs. However soft outputs are required in practical systems to fully exploit gains f...
Vishakan Ponnampalam, Darren McNamara, Andy Lillie...
GI
2004
Springer
14 years 22 days ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
COMCOM
2007
174views more  COMCOM 2007»
13 years 7 months ago
Directional geographical routing for real-time video communications in wireless sensor networks
In this paper, we address the problem of real-time video streaming over a bandwidth and energy constrained wireless sensor network (WSN) from a small number of dispersed video-sen...
Min Chen, Victor C. M. Leung, Shiwen Mao, Yong Yua...