Sciweavers

5752 search results - page 372 / 1151
» Informative Labeling Schemes
Sort
View
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 9 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
CHI
2005
ACM
16 years 5 months ago
Evaluating navigational surrogate formats with divergent browsing tasks
Navigational surrogates are representations that stand for information resources within search engine result sets, e-commerce sites, and digital libraries. They also form the basi...
Andruid Kerne, Steven M. Smith, Hyun Choi, Ross Gr...
ICC
2008
IEEE
15 years 11 months ago
MMSE Soft-Interference-Cancellation Aided Iterative Center-Shifting K-Best Sphere Detection for MIMO Channels
—Based on an EXtrinsic Information Transfer (EXIT) chart-assisted receiver design, a low-complexity near-Maximum A Posteriori (MAP) detector is constructed for high-throughput sy...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 11 months ago
Performance Analysis of Iteratively Decoded Variable-Length Space-Time Coded Modulation
— It is demonstrated that iteratively Decoded Variable Length Space Time Coded Modulation (VL-STCM-ID) schemes are capable of simultaneously providing both coding gain as well as...
Soon Xin Ng, Wei Liu, Jin Wang, Meixia Tao, Lie-Li...
IPPS
2007
IEEE
15 years 11 months ago
Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing
Most application level fault tolerance schemes in literature are non-adaptive in the sense that the fault tolerance schemes incorporated in applications are usually designed witho...
Zizhong Chen, Ming Yang, Guillermo A. Francia III,...