Sciweavers

785 search results - page 63 / 157
» Two remarks on remotality
Sort
View
JSAC
2006
127views more  JSAC 2006»
13 years 10 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
TIT
2008
79views more  TIT 2008»
13 years 9 months ago
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
We develop a couple of new methods to reduce transmission overheads in broadcast encryption. The methods are based on the idea of assigning one key per each partition using one-way...
Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Su...
TOG
2008
104views more  TOG 2008»
13 years 9 months ago
Streaming multigrid for gradient-domain operations on large images
We introduce a new tool to solve the large linear systems arising from gradient-domain image processing. Specifically, we develop a streaming multigrid solver, which needs just tw...
Michael M. Kazhdan, Hugues Hoppe
TWC
2008
150views more  TWC 2008»
13 years 9 months ago
Convex approximation techniques for joint multiuser downlink beamforming and admission control
Multiuser downlink beamforming under quality of service (QoS) constraints has attracted considerable interest in recent years, because it is particularly appealing from a network o...
Evaggelia Matskani, Nicholas D. Sidiropoulos, Zhi-...
BC
2004
114views more  BC 2004»
13 years 9 months ago
The world from a cat's perspective - statistics of natural videos
The mammalian visual system is one of the most intensively investigated sensory systems. However, our knowledge of the typical input it is operating on is surprisingly limited. To ...
Belinda Y. Betsch, Wolfgang Einhäuser, Konrad...