Sciweavers

1134 search results - page 197 / 227
» Distributed Proving in Access-Control Systems
Sort
View
STOC
2005
ACM
93views Algorithms» more  STOC 2005»
16 years 1 days ago
Representing hard lattices with O(n log n) bits
We present a variant of the Ajtai-Dwork public-key cryptosystem where the size of the public-key is only O(n log n) bits and the encrypted text/clear text ratio is also O(n log n)...
Miklós Ajtai
DCC
2007
IEEE
15 years 11 months ago
Lossless Transmission of Correlated Sources over a Multiple Access Channel with Side Information
In this paper, we consider lossless transmission of arbitrarily correlated sources over a multiple access channel. Characterization of the achievable rates in the most general set...
Deniz Gündüz, Elza Erkip
WIMOB
2009
IEEE
15 years 6 months ago
Exploiting RF-Scatter: Human Localization with Bistatic Passive UHF RFID-Systems
—In ubiquitous computing, localization of users in indoor environments is a challenging issue. On the one hand, localization data needs to have fine granularity to provide reaso...
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 6 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
ATAL
2009
Springer
15 years 6 months ago
Team competition
In a team competition, two participating teams have an equal number of players, and each team orders its players linearly based on their strengths. A mechanism then specifies how...
Pingzhong Tang, Yoav Shoham, Fangzhen Lin