Sciweavers

1871 search results - page 366 / 375
» The Ephemeral Pairing Problem
Sort
View
JSAC
2008
161views more  JSAC 2008»
13 years 7 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
KAIS
2008
119views more  KAIS 2008»
13 years 7 months ago
An information-theoretic approach to quantitative association rule mining
Abstract. Quantitative Association Rule (QAR) mining has been recognized an influential research problem over the last decade due to the popularity of quantitative databases and th...
Yiping Ke, James Cheng, Wilfred Ng
ECCC
2007
86views more  ECCC 2007»
13 years 7 months ago
Testing Halfspaces
This paper addresses the problem of testing whether a Boolean-valued function f is a halfspace, i.e. a function of the form f(x) = sgn(w·x−θ). We consider halfspaces over the ...
Kevin Matulef, Ryan O'Donnell, Ronitt Rubinfeld, R...
INFORMATICALT
2007
152views more  INFORMATICALT 2007»
13 years 7 months ago
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images
Abstract. Fractal image compression is an engaging and worthwhile technology that may be successfully applied to still image coding, especially at high compression ratios. Unfortun...
Jonas Valantinas, Tomas Zumbakis