Sciweavers

3623 search results - page 533 / 725
» Functionally Modeled User Interfaces
Sort
View
143
Voted
EUROCRYPT
2011
Springer
14 years 7 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
VTC
2007
IEEE
200views Communications» more  VTC 2007»
15 years 9 months ago
General Analysis of Uplink Group-Orthogonal MC-CDMA systems
Abstract—Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as a multiplexing technique for the uplink segment of wireless systems. The di...
Guillem Femenias, Felip Riera-Palou, Jaume Ramis
143
Voted
JCIT
2010
162views more  JCIT 2010»
14 years 10 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
WDAG
2007
Springer
125views Algorithms» more  WDAG 2007»
15 years 9 months ago
Approximating Wardrop Equilibria with Finitely Many Agents
We study adaptive routing algorithms in a round-based model. Suppose we are given a network equipped with load-dependent latency functions on the edges and a set of commodities eac...
Simon Fischer, Lars Olbrich, Berthold Vöcking
111
Voted
FOCS
2003
IEEE
15 years 8 months ago
On the Implementation of Huge Random Objects
We initiate a general study of pseudo-random implementations of huge random objects, and apply it to a few areas in which random objects occur naturally. For example, a random obj...
Oded Goldreich, Shafi Goldwasser, Asaf Nussboim