Sciweavers

682 search results - page 81 / 137
» Classifying arguments by scheme
Sort
View
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 7 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
TWC
2010
14 years 4 months ago
Frame detection and timing acquisition for OFDM transmissions with unknown interference
Abstract--Frame detection and timing acquisition are challenging tasks in orthogonal frequency-division multiplexing systems plagued by narrowband interference (NBI). Most existing...
Luca Sanguinetti, Michele Morelli, H. Vincent Poor
CISS
2010
IEEE
14 years 1 months ago
Queue based compression in a two-way relay network
—We consider the problem of joint rate scheduling and lossy data compression in a two-way relay network with distortion-sensitive stochastic packet traffic. A relay node facilit...
Ertugrul Necdet Ciftcioglu, Yalin Evren Sagduyu, A...
BIRTHDAY
2012
Springer
13 years 5 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...
WWW
2008
ACM
15 years 10 months ago
Floatcascade learning for fast imbalanced web mining
This paper is concerned with the problem of Imbalanced Classification (IC) in web mining, which often arises on the web due to the "Matthew Effect". As web IC applicatio...
Xiaoxun Zhang, Xueying Wang, Honglei Guo, Zhili Gu...