Sciweavers

2061 search results - page 400 / 413
» Authorization for Metacomputing Applications
Sort
View
CN
2008
176views more  CN 2008»
14 years 10 months ago
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks
The primary feature of cognitive radios for wireless communication systems is the capability to optimize the relevant communication parameters given a dynamic wireless channel env...
Alexandre de Baynast, Petri Mähönen, Mar...
COMPUTING
2008
174views more  COMPUTING 2008»
14 years 10 months ago
Multilevel algorithms for Rannacher-Turek finite element approximation of 3D elliptic problems
Generalizing the approach of a previous work [15] the authors present multilevel preconditioners for three-dimensional (3D) elliptic problems discretized by a family of Rannacher ...
Ivan Georgiev, Johannes Kraus, Svetozar Margenov
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 10 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2008
Springer
68views Education» more  CORR 2008»
14 years 10 months ago
Improved lower bound for deterministic broadcasting in radio networks
We consider the problem of deterministic broadcasting in radio networks when the nodes have limited knowledge about the topology of the network. We show that for every determinist...
Carlos Brito, Shailesh Vaya
CORR
2010
Springer
65views Education» more  CORR 2010»
14 years 10 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar