Sciweavers

1416 search results - page 57 / 284
» cost 2009
Sort
View
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 2 months ago
Block Detection of Multiple Symbol DPSK in a Statistically Unknown Time-Varying Channel
—We present a detection scheme for multiple-symbol DPSK for use in a statistically unknown time-varying channel. The scheme relies on a parametric representation of the timevaryi...
Nathan Ricklin, James R. Zeidler
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 2 months ago
Restless Watchdog: Monitoring Multiple Bands with Blind Period in Cognitive Radio Systems
— Spectrum sensing, which monitors the spectrum activity, is studied for cognitive radio systems using multiple frequency bands with non-negligible band switching time (blind per...
Husheng Li
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
14 years 2 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
14 years 2 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
AIMS
2009
Springer
14 years 2 months ago
Dynamics of Resource Closure Operators
Abstract. We propose a framework for managing resources via convergent operators. Operators represent their need for a resource to a designated resource closure operator that manag...
Alva L. Couch, Marc Chiarini