Sciweavers

1747 search results - page 37 / 350
» Long Range Dependence
Sort
View
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
16 years 2 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
EJWCN
2011
133views more  EJWCN 2011»
14 years 9 months ago
CARNIVORE: A Disruption-Tolerant System for Studying Wildlife
—This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-tocatch/observe wildlife in their natural habitat. CARNIVORE consists of a...
Matthew Rutishauser, Vladislav Petkov, Jay Boice, ...
ICN
2007
Springer
15 years 8 months ago
Distance-Dependent RED Policy (DDRED)
— The network quality of service (QoS) and the congestion control of the transport protocol are important parameters for the performance of a network data transfer. To this end, ...
Sebastien Linck, Eugen Dedu, François Spies
COMPGEOM
2009
ACM
15 years 8 months ago
Cache-oblivious range reporting with optimal queries requires superlinear space
We consider a number of range reporting problems in two and three dimensions and prove lower bounds on the amount of space used by any cache-oblivious data structure for these pro...
Peyman Afshani, Chris H. Hamilton, Norbert Zeh
TOG
2008
102views more  TOG 2008»
15 years 1 months ago
Fluorescent immersion range scanning
The quality of a 3D range scan should not depend on the surface properties of the object. Most active range scanning techniques, however, assume a diffuse reflector to allow for a...
Matthias B. Hullin, Martin Fuchs, Ivo Ihrke, Hans-...