Sciweavers

752 search results - page 43 / 151
» The standard parts problem and the complexity of control com...
Sort
View
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
CODES
2006
IEEE
14 years 1 months ago
A buffer-sizing algorithm for networks on chip using TDMA and credit-based end-to-end flow control
When designing a System-on-Chip (SoC) using a Networkon-Chip (NoC), silicon area and power consumption are two key elements to optimize. A dominant part of the NoC area and power ...
Martijn Coenen, Srinivasan Murali, Andrei Radulesc...
SACMAT
2010
ACM
14 years 16 days ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
CDC
2008
IEEE
131views Control Systems» more  CDC 2008»
14 years 2 months ago
Explicit model predictive control for linear parameter-varying systems
Abstract— In this paper we demonstrate how one can reformulate the MPC problem for LPV systems to a series of mpLPs by a closed-loop minimax MPC algorithm based on dynamic progra...
Thomas Besselmann, Johan Löfberg, Manfred Mor...
ISM
2008
IEEE
72views Multimedia» more  ISM 2008»
14 years 2 months ago
A Novel Noncausal Whole-Frame Concealment Algorithm for Video Streaming
Error concealment is very important for video communication as an application-layer error control mechanism which can be used independently of the underlying communication infrast...
S. Mohsen Amiri, Ivan V. Bajic