Sciweavers

128 search results - page 1 / 26
» A Detailed Analysis of SAFER K
Sort
View
JOC
2000
130views more  JOC 2000»
13 years 4 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen

Publication
412views
15 years 2 months ago
Analyzing Transit Service Reliability using Detailed Data From Automatic Vehicular Locator Systems
The widespread adoption of automated vehicle location systems (AVL) and automatic passenger counters (APC) in the transit industry has opened new venues in operations and system mo...
A. M. El-Geneidy, J. Horning, K. J. Krizek
ICASSP
2011
IEEE
12 years 8 months ago
On the sum rate of ZF detectors over correlated K fading MIMO channels
This paper presents a detailed sum rate investigation of Zero-Forcing (ZF) detectors over composite multiple-input multiple-output (MIMO) channels. To this end, we consider the ge...
Michail Matthaiou, Nestor D. Chatzidiamantis, Geor...
ICDE
2011
IEEE
380views Database» more  ICDE 2011»
12 years 8 months ago
Influence Zone: Efficiently Processing Reverse k Nearest Neighbors Queries
Given a set of objects and a query q, a point p is called the reverse k nearest neighbor (RkNN) of q if q is one of the k closest objects of p. In this paper, we introduce the c...
Muhammad Aamir Cheema, Xuemin Lin, Wenjie Zhang, Y...