Sciweavers

3639 search results - page 117 / 728
» Provenance as Dependency Analysis
Sort
View
IJNSEC
2008
108views more  IJNSEC 2008»
14 years 10 months ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
CORR
2007
Springer
105views Education» more  CORR 2007»
14 years 10 months ago
Optimal Order of Decoding for Max-Min Fairness in K-User Memoryless Interference Channels
A K-user memoryless interference channel is considered where each receiver sequentially decodes the data of a subset of transmitters before it decodes the data of the designated t...
Mohammad Ali Maddah-Ali, Hajar Mahdavi-Doost, Amir...
ICMLA
2009
14 years 7 months ago
Learning Deep Neural Networks for High Dimensional Output Problems
State-of-the-art pattern recognition methods have difficulty dealing with problems where the dimension of the output space is large. In this article, we propose a new framework ba...
Benjamin Labbé, Romain Hérault, Cl&e...
ICIP
2010
IEEE
15 years 4 months ago
Real-time content-aware image resizing using reduced linear model
In this paper is presented an effective and efficient method for content-aware image resizing. It is based on the solution of a linear system where each pixel displacement (compres...
Edoardo Ardizzone, Roberto Gallea, Roberto Pirrone
TWC
2010
14 years 4 months ago
MIMO Broadcast Channels with Spatial Heterogeneity
We develop a realistic model for multiple-input multiple-output (MIMO) broadcast channels, where each randomly located user's average SNR depends on its distance from the tran...
Illsoo Sohn, Jeffrey G. Andrews, Kwang Bok Lee