Sciweavers

1162 search results - page 70 / 233
» An Information-Based Theory of Conditionals
Sort
View
WONS
2012
IEEE
13 years 7 months ago
Obfuscating IEEE 802.15.4 communication using secret spreading codes
—The IEEE 802.15.4 standard specifies an M-ary spread spectrum system with public and fixed spreading sequences. We propose instead to use secret and dynamic, random spreading ...
Bjorn Muntwyler, Vincent Lenders, Franck Legendre,...
CVPR
2004
IEEE
16 years 1 months ago
A GMM Parts Based Face Representation for Improved Verification through Relevance Adaptation
Motivated by the success of parts based representations in face detection we have attempted to address some of the problems associated with applying such a philosophy to the task ...
Simon Lucey, Tsuhan Chen
INFOCOM
2007
IEEE
15 years 6 months ago
Joint Optimal Channel Probing and Transmission in Collocated Wireless Networks
— We consider a collocated wireless network where all links contend for a given channel and each link can hear others’ transmissions. Due to channel fading, the link condition ...
Dong Zheng, Junshan Zhang
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...
IJCAI
1989
15 years 1 months ago
Filter Preferential Entailment for the Logic of Action in Almost Continuous Worlds
Mechanical systems, of the kinds which are of interest for qualitative reasoning, are characterized by a set of real-valued parameters, each of which is a piecewise continuous fun...
Erik Sandewall