Sciweavers

472 search results - page 86 / 95
» Symbolic range propagation
Sort
View
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 8 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
GLOBECOM
2010
IEEE
13 years 7 months ago
Automatic Gain Control for ADC-Limited Communication
As the date rates and bandwidths of communication systems scale up, the cost and power consumption of highprecision (e.g., 8-12 bits) analog-to-digital converters (ADCs) become pro...
Feifei Sun, Jaspreet Singh, Upamanyu Madhow
ECOI
2011
240views ECommerce» more  ECOI 2011»
13 years 4 months ago
HerbariaViz: A web-based client-server interface for mapping and exploring flora observation data
The potential for physical flora collections to support scientific research is being enhanced by rapid development of digital databases that represent characteristics of the physic...
Tom Auer, Alan M. MacEachren, Craig McCabe, Scott ...
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 1 months ago
Broadcast Channels with Delayed Finite-Rate Feedback: Predict or Observe?
Most multiuser precoding techniques require accurate transmitter channel state information (CSIT) to maintain orthogonality between the users. Such techniques have proven quite fr...
Jiaming Xu, Jeffrey G. Andrews, Syed Ali Jafar
POPL
2012
ACM
12 years 5 months ago
Algebraic foundations for effect-dependent optimisations
We present a general theory of Gifford-style type and effect annotations, where effect annotations are sets of effects. Generality is achieved by recourse to the theory of algebra...
Ohad Kammar, Gordon D. Plotkin