Sciweavers

3483 search results - page 156 / 697
» Forward
Sort
View
AIS
2006
Springer
15 years 4 months ago
"Carnivore personal edition": exploring distributed data surveillance
The goal of this paper is to offer, in straight forward terms, some practical insight into distributed data surveillance. I will use the software project Carnivore as a case study....
Alexander R. Galloway
55
Voted
CORR
2006
Springer
94views Education» more  CORR 2006»
15 years 4 months ago
Cooperative Lattice Coding and Decoding
We propose novel lattice coding/decoding schemes for half-duplex outage-limited cooperative channels. These schemes are inspired by the cooperation protocols of Azarian et al. and ...
Arul D. Murugan, Kambiz Azarian, Hesham El Gamal
130
Voted
IJNSEC
2008
104views more  IJNSEC 2008»
15 years 3 months ago
Solutions to Key Exposure Problem in Ring Signature
In this paper, we suggest solutions to the key exposure problem in ring signature. In particular, we propose the first forward secure ring signature scheme and the first key-insul...
Joseph K. Liu, Duncan S. Wong
131
Voted
JCIT
2008
131views more  JCIT 2008»
15 years 3 months ago
Intelligent Tutoring System: Predicting Students Results Using Neural Networks
In this paper we propose methods to utilize Artificial Neural Networks to obtain knowledge for the management of educational resources. The final evaluations provide us a model th...
E. R. Naganathan, R. Venkatesh, N. Uma Maheswari
JSAC
2006
100views more  JSAC 2006»
15 years 3 months ago
Analysis and optimization of CDMA systems with chip-level interleavers
Abstract--In this paper, we present an unequal power allocation technique to increase the throughput of code-division multiple-access (CDMA) systems with chip-level interleavers. P...
Lihai Liu, Jun Tong, Li Ping