Sciweavers

317 search results - page 27 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
ACISP
2003
Springer
15 years 3 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon
TIT
2011
148views more  TIT 2011»
14 years 4 months ago
On Two-User Gaussian Multiple Access Channels With Finite Input Constellations
—Constellation Constrained (CC) capacity regions of two-user Single-Input Single-Output (SISO) Gaussian Multiple Access Channels (GMAC) are computed for several Non-Orthogonal Mu...
Jagadeesh Harshan, Bikash Sundar Rajan
PERCOM
2011
ACM
14 years 1 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
ICMCS
2007
IEEE
126views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Robust Commercial Retrieval in Video Streams
TV commercial video is a kind of informative medium. To fast and robustly index and retrieve commercial videos is of interest to commercial monitor, copyright protection, and comm...
Jinqiao Wang, Lingyu Duan, Qingshan Liu, Hanqing L...
TIT
2008
95views more  TIT 2008»
14 years 9 months ago
Error Exponent Regions for Gaussian Broadcast and Multiple-Access Channels
In modern communication systems, different users have different requirements for quality of service (QoS). In this work, QoS refers to the average codeword error probability experi...
Lihua Weng, S. Sandeep Pradhan, Achilleas Anastaso...