Sciweavers

485 search results - page 77 / 97
» Key technologies for the next generation wireless communicat...
Sort
View
ICC
2007
IEEE
178views Communications» more  ICC 2007»
15 years 4 months ago
Cooperation and Cognitive Radio
Abstract— Cooperation is increasingly regarded as a key technology for tackling the challenges of a practical implementation of cognitive radio. In this paper, we first give a b...
Osvaldo Simeone, Jonathan Gambini, Yeheskel Bar-Ne...
BCI
2009
IEEE
15 years 4 months ago
On the Performance of SVD-Based Algorithms for Collaborative Filtering
—In this paper, we describe and compare three Collaborative Filtering (CF) algorithms aiming at the low-rank approximation of the user-item ratings matrix. The algorithm implemen...
Manolis G. Vozalis, Angelos I. Markos, Konstantino...
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
DIM
2005
ACM
14 years 11 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
PERCOM
2007
ACM
15 years 9 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch