Sciweavers

76 search results - page 11 / 16
» Practical Constructions to Multiple Designated Confirmer Sig...
Sort
View
77
Voted
INFOCOM
2009
IEEE
15 years 6 months ago
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks
—In this paper, we study the problem of constructing full-coverage three dimensional networks with multiple connectivity. We design a set of patterns for full coverage and two re...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
96
Voted
TIT
1998
105views more  TIT 1998»
14 years 11 months ago
Diversity Waveform Sets for Delay-Doppler Imaging
Abstract— Properties of the ambiguity function and the uncertainty relation of Fourier transforms assert fundamental limitations on the ability of any single radar waveform of co...
Jiann-Ching Guey, Mark R. Bell
CCS
2010
ACM
14 years 9 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
MOBIHOC
2005
ACM
15 years 11 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning
SIGSOFT
2008
ACM
16 years 14 days ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde