Sciweavers

2392 search results - page 73 / 479
» Channel-Hopping Multiple Access
Sort
View
TIT
2008
147views more  TIT 2008»
14 years 9 months ago
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
Error-correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, the connections between codes, matroids, and a special cla...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
GLOBECOM
2006
IEEE
15 years 4 months ago
Harnessing the Parity of Multiple Errors in End-to-End MAC Schemes
— We present the results of simulation experiments that compare end-to-end error management (used in controlled access MAC protocols) against hop-by-hop error management (used in...
Ghassen Ben Brahim, Bilal Khan, Ala I. Al-Fuqaha, ...
CSREASAM
2003
14 years 11 months ago
Developing Secure Web Services for Computational Portals
Computational web portals provide uniform access to remote computational resources--hardware, software, and data--by hiding the complexity of the heterogeneous, distributed, high ...
Choon-Han Youn, Marlon E. Pierce, Geoffrey Fox
NAR
2006
119views more  NAR 2006»
14 years 10 months ago
HHsenser: exhaustive transitive profile search using HMM-HMM comparison
HHsenser is the first server to offer exhaustive intermediate profile searches, which it combines with pairwise comparison of hidden Markov models. Starting from a single protein ...
Johannes Söding, Michael Remmert, Andreas Bie...
TWC
2008
98views more  TWC 2008»
14 years 9 months ago
Using Parasitic Elements for Implementing the Rotating Antenna for MIMO Receivers
Abstract--We consider a new concept of a Multiple-InputMultiple-Output (MIMO) receiver which uses one active receiving antenna and multiple parasitic elements. The parasitic elemen...
Robert Bains, Ralf R. Müller