Sciweavers

2250 search results - page 430 / 450
» Authorizing applications in singularity
Sort
View
COMPUTING
2008
174views more  COMPUTING 2008»
14 years 9 months ago
Multilevel algorithms for Rannacher-Turek finite element approximation of 3D elliptic problems
Generalizing the approach of a previous work [15] the authors present multilevel preconditioners for three-dimensional (3D) elliptic problems discretized by a family of Rannacher ...
Ivan Georgiev, Johannes Kraus, Svetozar Margenov
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 9 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2008
Springer
68views Education» more  CORR 2008»
14 years 9 months ago
Improved lower bound for deterministic broadcasting in radio networks
We consider the problem of deterministic broadcasting in radio networks when the nodes have limited knowledge about the topology of the network. We show that for every determinist...
Carlos Brito, Shailesh Vaya
CORR
2010
Springer
65views Education» more  CORR 2010»
14 years 9 months ago
On Unconditionally Secure Computation with Vanishing Communication Cost
We propose a novel distortion-theoretic approach to a secure three-party computation problem. Alice and Bob have deterministic sequences, and Charlie wishes to compute a normalize...
Ye Wang, Shantanu Rane, Wei Sun, Prakash Ishwar
CSE
2010
IEEE
14 years 9 months ago
MCALab: Reproducible Research in Signal and Image Decomposition and Inpainting
Morphological Component Analysis (MCA) of signals and images is an ambitious and important goal in signal processing; successful methods for MCA have many far-reaching application...
Mohamed-Jalal Fadili, Jean-Luc Starck, Michael Ela...