Sciweavers

275 search results - page 27 / 55
» On the computational power of iterative auctions
Sort
View
77
Voted
EUROCRYPT
2010
Springer
15 years 2 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
CEC
2005
IEEE
15 years 3 months ago
Localization using evolution strategies in sensornets
With the emergence of wireless sensor networks and pervasive computing, innovative location-aware technologies and services are being investigated. Several iterative approaches emp...
Mark Terwilliger, Ajay K. Gupta, Ashfaq A. Khokhar...
TCIAIG
2010
14 years 4 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
VTC
2008
IEEE
178views Communications» more  VTC 2008»
15 years 4 months ago
Downlink Linear Max-MSE Transceiver Design for Multiuser MIMO Systems Via Dual Decomposition
—This paper addresses the problem of joint linear transceiver design in the downlink of multiuser MIMO systems. We define the performance criterion as minimizing the maximal mea...
Yuanzhang Xiao, Shidong Zhou
GLOBECOM
2006
IEEE
15 years 3 months ago
An Adaptive-Scaling Tone Reservation Algorithm for PAR Reduction in OFDM Systems
— Existing tone-reservation algorithms (such as the controlled clipper algorithm) for OFDM require a number of iterations to ensure the reduction of Peak-to-Average Power Ratio (...
Luqing Wang, Chintha Tellambura