Sciweavers

1147 search results - page 208 / 230
» Transformation of Access Rights
Sort
View
TIT
2008
147views more  TIT 2008»
13 years 7 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
JNW
2007
75views more  JNW 2007»
13 years 7 months ago
Improving and Analyzing LC-Trie Performance for IP-Address Lookup
— IP-address lookup is a key processing function of Internet routers. The lookup is challenging because it needs to perform a longest prefix match. In this paper, we present our...
Jing Fu, Olof Hagsand, Gunnar Karlsson
TSP
2008
90views more  TSP 2008»
13 years 7 months ago
Generalized Correlation Decomposition-Based Blind Channel Estimation in DS-CDMA Systems With Unknown Wide-Sense Stationary Noise
A new blind subspace-based channel estimation technique is proposed for direct-sequence code-division multiple access (DS-CDMA) systems operating in the presence of unknown wide-se...
Keyvan Zarifi, Alex B. Gershman
WS
2008
ACM
13 years 7 months ago
Translating the Foundational Model of Anatomy into OWL
The Foundational Model of Anatomy (FMA) [7] represents the result of manual and disciplined modeling of the structural organization of the human body. Many workers in medical info...
Natalya Fridman Noy, Daniel L. Rubin
PC
1998
101views Management» more  PC 1998»
13 years 7 months ago
Performing Out-of Core FFTs on Parallel Disk Systems
The Fast Fourier Transform (FFT) plays a key role in many areas of computational science and engineering. Although most one-dimensional FFT problems canbe entirely solvedentirely ...
Thomas H. Cormen, David M. Nicol