Sciweavers

15033 search results - page 2998 / 3007
» Complexity Theory and Algorithms
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 9 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ECIR
2009
Springer
14 years 9 months ago
Refining Keyword Queries for XML Retrieval by Combining Content and Structure
Abstract. The structural heterogeneity and complexity of XML repositories makes query formulation challenging for users who have little knowledge of XML. To assist its users, an XM...
Desislava Petkova, W. Bruce Croft, Yanlei Diao
GI
2009
Springer
14 years 9 months ago
Generating Product-based Availability Overviews for Fixed Line Network Access Points
: Product customization has become a commonplace topic in the last few years. Cars can be equipped with numerous gadgets, cell phones come in different colours and so on. In all th...
Christoph Wiesen, Thorsten Wunderlich, Robert Mert...
ICC
2009
IEEE
101views Communications» more  ICC 2009»
14 years 9 months ago
Using Limited Feedback in Power Allocation Design for a Two-Hop Relay OFDM System
In this paper, we study power allocation (PA) in a single-relay OFDM system with limited feedback. We propose a PA scheme that uses a codebook of quantized PA vectors designed offl...
Mahdi Hajiaghayi, Min Dong, Ben Liang
IDA
2009
Springer
14 years 9 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
« Prev « First page 2998 / 3007 Last » Next »