Sciweavers

1610 search results - page 143 / 322
» Identity Based Multisignatures
Sort
View
101
Voted
CORR
2007
Springer
94views Education» more  CORR 2007»
15 years 3 months ago
Neighbor Discovery in Wireless Networks:A Multiuser-Detection Approach
— We examine the problem of determining which nodes are neighbors of a given one in a wireless network. We consider an unsupervised network operating on a frequencyflat Gaussian...
Daniele Angelosante, Ezio Biglieri, Marco Lops
JSYML
2008
66views more  JSYML 2008»
15 years 3 months ago
Flat algebras and the translation of universal Horn logic to equational logic
We describe which subdirectly irreducible flat algebras arise in the variety generated by an arbitrary class of flat algebras with absorbing bottom element. This is used to give an...
Marcel Jackson
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 10 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
TIT
2010
104views Education» more  TIT 2010»
14 years 10 months ago
Nonparametric statistical inference for ergodic processes
In this work a method for statistical analysis of time series is proposed, which is used to obtain solutions to some classical problems of mathematical statistics under the only as...
Daniil Ryabko, Boris Ryabko
ICASSP
2011
IEEE
14 years 7 months ago
Sliding window greedy RLS for sparse filters
We present a sliding window RLS for sparse filters, based on the greedy least squares algorithm. The algorithm adapts a partial QR factorization with pivoting, using a simplifie...
Alexandru Onose, Bogdan Dumitrescu, Ioan Tabus