Sciweavers

3130 search results - page 38 / 626
» Collusion without communication
Sort
View
TIT
2010
110views Education» more  TIT 2010»
14 years 6 months ago
Secure communications with insecure feedback: breaking the high-SNR ceiling
A multiple-antenna Gaussian wiretap channel in which the number of antennas at the source is not greater than that at the eavesdropper is considered. Without feedback, the secrecy...
Tùng T. Kim, H. Vincent Poor
IFIP
1992
Springer
15 years 3 months ago
Controller Implementation by Communicating Asynchronous Sequential Circuits Generated from a Petri Net Specification of Required
This paper presents a completely systematic design procedure for asynchronous controllers. The initial step is the construction of a signal transition graph (STG, an interpreted P...
Jochen Beister, Ralf Wollowski
CHI
2003
ACM
16 years 5 days ago
Coordinating communication: awareness displays and interruption
In this paper, we describe a laboratory experiment to determine whether peripheral awareness information about a remote collaborator's workload aids in timing interruptive co...
Laura Dabbish, Robert E. Kraut
EOR
2010
88views more  EOR 2010»
14 years 12 months ago
Monge extensions of cooperation and communication structures
Cooperation structures without any a priori assumptions on the combinatorial structure of feasible coalitions are studied and a general theory for marginal values, cores and conve...
Ulrich Faigle, Michel Grabisch, M. Heyne
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
15 years 6 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg