Sciweavers

CORR
2007
Springer
76views Education» more  CORR 2007»
13 years 7 months ago
Guessing based on length functions
— Close relationships between guessing functions and length functions are established. Good length functions lead to good guessing functions. In particular, guessing in the incre...
Rajesh Sundaresan
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 7 months ago
The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
—The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two-way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users communicate wit...
Ender Tekin, Aylin Yener
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 7 months ago
AMIE: An annotation model for information research
The objective of most users for consulting any information database, information warehouse or the internet is to resolve one problem or the other. Available online or offline anno...
Charles A. Robert, David Amos
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 7 months ago
AMIEDoT: An annotation model for document tracking and recommendation service
The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on inf...
Charles A. Robert
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 7 months ago
Exploring the academic invisible web
Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We defi...
Dirk Lewandowski, Philipp Mayr
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 7 months ago
Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm
— This paper explores optimization of paging and registration policies in cellular networks. Motion is modeled as a discrete-time Markov process, and minimization of the discount...
Bruce Hajek, Kevin Mitzel, Sichao Yang
CORR
2007
Springer
88views Education» more  CORR 2007»
13 years 7 months ago
Avoiding bias in cards cryptography
M. D. Atkinson, Hans P. van Ditmarsch, S. Roehling
CORR
2007
Springer
70views Education» more  CORR 2007»
13 years 7 months ago
Secure Broadcasting
Abstract—We study a problem of broadcasting confidential messages to multiple receivers under an information-theoretic secrecy constraint. Two scenarios are considered: 1) all r...
Ashish Khisti, Aslan Tchamkerten, Gregory W. Worne...
CORR
2007
Springer
95views Education» more  CORR 2007»
13 years 7 months ago
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two ...
Yucel Altug, N. Polat Ayerden, Mehmet Kivanç...