Sciweavers

85 search results - page 10 / 17
» Probability of Error in Information-Hiding Protocols
Sort
View
ESA
2006
Springer
94views Algorithms» more  ESA 2006»
15 years 5 months ago
Contention Resolution with Heterogeneous Job Sizes
Abstract. We study the problem of contention resolution for differentsized jobs on a simple channel. When a job makes a run attempt, it learns only whether the attempt succeeded or...
Michael A. Bender, Jeremy T. Fineman, Seth Gilbert
129
Voted
CRYPTO
2001
Springer
111views Cryptology» more  CRYPTO 2001»
15 years 6 months ago
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
Consider a scenario where an l-bit secret has been distributed among n players by an honest dealer using some secret sharing scheme. Then, if all players behave honestly, the secre...
Ronald Cramer, Ivan Damgård, Serge Fehr
BROADNETS
2007
IEEE
15 years 8 months ago
Goodput optimization in CSMA/CA wireless networks
—Packet based wireless networks have provided high data rates, and the desire for ubiquitous wireless computing is growing rapidly. To accommodate these demands, wireless systems...
Yusun Chang, Christopher P. Lee, John A. Copeland
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
TWC
2008
184views more  TWC 2008»
15 years 1 months ago
Distributed Space-Frequency Coding over Broadband Relay Channels
Abstract--Designing diversity achieving schemes over the wireless broadband fading relay channels is crucial to achieve higher diversity gains. These gains are achieved by exploiti...
Karim G. Seddik, K. J. Ray Liu