Sciweavers

475 search results - page 33 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ASAP
2007
IEEE
107views Hardware» more  ASAP 2007»
14 years 4 months ago
A Hardware-Oriented Method for Evaluating Complex Polynomials
A hardware-oriented method for evaluating complex polynomials by solving iteratively a system of linear equations is proposed. Its implementation uses a digit-serial iterations on...
Milos D. Ercegovac, Jean-Michel Muller
GLOBECOM
2007
IEEE
14 years 4 months ago
Evaluation of the Probability of K-Hop Connection in Homogeneous Wireless Sensor Networks
— Given a wireless sensor network (WSN) whose sensors are randomly and independently distributed in a bounded area following a homogeneous Poisson process with density ρ and eac...
Xiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson
GLOBECOM
2007
IEEE
14 years 4 months ago
Impact of Correlation on Linear Precoding in QSTBC Coded Systems with Linear MSE Detection
— In this paper, we study a wireless multiple-input multiple-output system in a Rayleigh flat-fading environment with correlation among the transmit antennas. We assume that the...
Aydin Sezgin, Arogyaswami Paulraj, Mai Vu
INFOCOM
2007
IEEE
14 years 4 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny