Sciweavers

1213 search results - page 171 / 243
» Traceability for System Families
Sort
View
ACSAC
2009
IEEE
14 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
INFOCOM
2009
IEEE
14 years 4 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu
JCDL
2009
ACM
121views Education» more  JCDL 2009»
14 years 4 months ago
Improving historical research by linking digital library information to a global genealogical database
Journals, letters, and other writings are of great value to historians and those who research their own family history; however, it can be difficult to find writings by specific...
Douglas J. Kennard, William B. Lund, Bryan S. Mors...
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 4 months ago
Quadratic-Congruence Carrier-Hopping Prime Code for Multicode-Keying Optical CDMA
—In this paper, we study a new family of carrier-hopping prime codes (CHPCs), so-called quadraticcongruence CHPC (QC-CHPC), with expanded code cardinality by relaxing the maximum...
Wing C. Kwong, Cheng-Yuan Chang, Hung-Ta Chen, Guu...
ATAL
2007
Springer
14 years 4 months ago
Q-value functions for decentralized POMDPs
Planning in single-agent models like MDPs and POMDPs can be carried out by resorting to Q-value functions: a (near-) optimal Q-value function is computed in a recursive manner by ...
Frans A. Oliehoek, Nikos A. Vlassis