Sciweavers

5752 search results - page 304 / 1151
» Informative Labeling Schemes
Sort
View
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 11 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
ISCAS
2006
IEEE
107views Hardware» more  ISCAS 2006»
15 years 10 months ago
Design and implementation of content-adaptive background skipping for wireless video
—This work presents a low-complexity system implementation of a novel content-adaptive background skipping scheme for region-of-interest (ROI) video coding in mobile video phone ...
Yi Liang, Haohong Wang, Khaled El-Maleh
CTRSA
2003
Springer
120views Cryptology» more  CTRSA 2003»
15 years 9 months ago
Simple Backdoors for RSA Key Generation
We present extremely simple ways of embedding a backdoor in the key generation scheme of RSA. Three of our schemes generate two genuinely random primes p and q of a given size, to...
Claude Crépeau, Alain Slakmon
CORR
2007
Springer
78views Education» more  CORR 2007»
15 years 4 months ago
Power Allocation for Discrete-Input Non-Ergodic Block-Fading Channels
Abstract— We consider power allocation algorithms for fixedrate transmission over Nakagami-m non-ergodic block-fading channels with perfect transmitter and receiver channel stat...
Khoa D. Nguyen, Albert Guillen i Fabregas, Lars K....
CDC
2009
IEEE
160views Control Systems» more  CDC 2009»
15 years 2 months ago
Exploring and exploiting routing opportunities in wireless ad-hoc networks
Abstract--In this paper, d-AdaptOR, a distributed opportunistic routing scheme for multi-hop wireless ad-hoc networks is proposed. The proposed scheme utilizes a reinforcement lear...
Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi,...