Sciweavers

2059 search results - page 37 / 412
» A Directed Threshold - Signature Scheme
Sort
View
159
Voted
SIAMSC
2008
142views more  SIAMSC 2008»
15 years 5 months ago
A Fast Direct Solver for the Biharmonic Problem in a Rectangular Grid
We present a fast direct solver methodology for the Dirichlet biharmonic problem in a rectangle. The solver is applicable in the case of the second order Stephenson scheme [34] as ...
Matania Ben-Artzi, Jean-Pierre Croisille, Dalia Fi...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
15 years 3 months ago
Superposition Coding Aided Bi-Directional Relay Transmission Employing Iteratively Decoded Self-Concatenated Convolutional Codes
— In this paper, we consider coding schemes designed for two nodes communicating with each other with the aid of a relay node, which receives information from the two nodes in th...
Muhammad Fasih Uddin Butt, Rong Zhang, Soon Xin Ng...
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
15 years 9 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
ISCI
2007
103views more  ISCI 2007»
15 years 5 months ago
Threshold-based declustering
Declustering techniques reduce query response time through parallel I/O by distributing data among multiple devices. Except for a few cases it is not possible to find declusterin...
Ali Saman Tosun
AHSWN
2008
163views more  AHSWN 2008»
15 years 5 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu