Sciweavers

813 search results - page 145 / 163
» desire 2010
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 10 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2010
Springer
190views Education» more  CORR 2010»
13 years 10 months ago
Stable marriage problems with quantitative preferences
The stable marriage problem is a well-known problem of matching men to women so that no man and woman, who are not married to each other, both prefer each other. Such a problem ha...
Maria Silvia Pini, Francesca Rossi, Kristen Brent ...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 10 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 10 months ago
Coalition Formation Games for Collaborative Spectrum Sensing
Abstract--Collaborative Spectrum Sensing (CSS) between secondary users (SUs) in cognitive networks exhibits an inherent tradeoff between minimizing the probability of missing the d...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 9 months ago
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be eng...
Alan Dearle, Graham N. C. Kirby, Stuart J. Norcros...