Sciweavers

2478 search results - page 323 / 496
» Message from the Chair
Sort
View
124
Voted
ACMSE
2009
ACM
14 years 10 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
104
Voted
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 7 months ago
Optimal Channel Training in Uplink Network MIMO Systems
We consider a multi-cell frequency-selective fading uplink channel (network MIMO) from K singleantenna user terminals (UTs) to B cooperative base stations (BSs) with M antennas ea...
Jakob Hoydis, Mari Kobayashi, Mérouane Debb...
JSAC
2011
159views more  JSAC 2011»
14 years 7 months ago
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
—Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the ...
Beibei Wang, Yongle Wu, K. J. Ray Liu, T. Charles ...
140
Voted
IEEEVAST
2010
14 years 7 months ago
Diamonds in the rough: Social media visual analytics for journalistic inquiry
Journalists increasingly turn to social media sources such as Facebook or Twitter to support their coverage of various news events. For large-scale events such as televised debate...
Nicholas Diakopoulos, Mor Naaman, Funda Kivran-Swa...
132
Voted
TMM
2010
178views Management» more  TMM 2010»
14 years 7 months ago
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals
Abstract--In this article, a video multicast protocol for multihomed mobile terminals is proposed as an alternative stream control transmission protocol (SCTP) for partially reliab...
Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa C...