Sciweavers

84 search results - page 15 / 17
» ma 2011
Sort
View
CHI
2011
ACM
12 years 9 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 8 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
ICASSP
2011
IEEE
12 years 9 months ago
Robust secondary multicast transmit beamforming for cognitive radio networks under imperfect channel state information
Consider a robust downlink beamforming optimization problem for secondary multicast transmission in a multiple-input multiple-output (MIMO) spectrum sharing cognitive radio (CR) n...
Yongwei Huang, Qiang Li, Wing-Kin Ma, Shuzhong Zha...
ICCV
2011
IEEE
12 years 6 months ago
Unwrapping Low-rank Textures on Generalized Cylindrical Surfaces
In this paper, we show how to reconstruct both 3D shape and 2D texture of a class of surfaces from a single perspective image. We consider the so-called the generalized cylindrica...
Zhengdong Zhang, Xiao Liang, Yi Ma
ICASSP
2011
IEEE
12 years 9 months ago
Multicast transmit beamforming using a randomize-in-time strategy
Recently there has been much interest in using transmit beamforming to provide multi-antenna physical-layer multicasting. A state of the art in this context is the semidefinite r...
Sissi X. Wu, Wing-Kin Ma