Sciweavers

204 search results - page 19 / 41
» el 2006
Sort
View
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 4 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
INFOCOM
2006
IEEE
15 years 10 months ago
Optimal Hopping in Ad Hoc Wireless Networks
— Gupta and Kumar showed that throughput in a static random wireless network increases with the amount of hopping. In a subsequent paper (2004), it was shown that although throug...
Abbas El Gamal, James P. Mammen
ISCAS
2006
IEEE
92views Hardware» more  ISCAS 2006»
15 years 10 months ago
The optimal MAC layer for low-power UWB is non-coordinated
— We consider the design of the MAC layer for low power, low data-rate, impulse-radio ultra-wide band (IRUWB) networks. In such networks, the primary concern is energy consumptio...
Ruben Merz, Alaeddine El Fawal, Jean-Yves Le Boude...
COLT
2006
Springer
15 years 7 months ago
Stable Transductive Learning
Abstract. We develop a new error bound for transductive learning algorithms. The slack term in the new bound is a function of a relaxed notion of transductive stability, which meas...
Ran El-Yaniv, Dmitry Pechyony
ECAI
2006
Springer
15 years 7 months ago
Prevention of Harmful Behaviors Within Cognitive and Autonomous Agents
Being able to ensure that a multiagent system will not generate undesirable behaviors is essential within the context of critical applications (embedded systems or real-time system...
Caroline Chopinaud, Amal El Fallah-Seghrouchni, Pa...