Sciweavers

868 search results - page 117 / 174
» A new approach for factorizing FSM's
Sort
View
ICC
2007
IEEE
15 years 4 months ago
Adaptive Channel Reuse in Cellular Systems
Abstract— In cellular systems a large reuse distance reduces cochannel interference while a small reuse distance increases bandwidth allocated to each cell. The optimal reuse dis...
Yifan Liang, Andrea J. Goldsmith
ASIACRYPT
2007
Springer
15 years 4 months ago
How to Build a Hash Function from Any Collision-Resistant Function
Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision ...
Thomas Ristenpart, Thomas Shrimpton
DRM
2007
Springer
15 years 4 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
HUC
2007
Springer
15 years 4 months ago
Rapidly Exploring Application Design Through Speed Dating
Abstract. While the user-centered design methods we bring from humancomputer interaction to ubicomp help sketch ideas and refine prototypes, few tools or techniques help explore di...
Scott Davidoff, Min Kyung Lee, Anind K. Dey, John ...
INFOCOM
2006
IEEE
15 years 4 months ago
Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions
— We address the problem of energy efficient sensing by adaptively coordinating the sleep schedules of sensor nodes while guaranteeing that values of sleeping nodes can be recov...
Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak