Sciweavers

5580 search results - page 697 / 1116
» Randomized priority algorithms
Sort
View
HOST
2008
IEEE
15 years 10 months ago
Slicing Up a Perfect Hardware Masking Scheme
—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the power dissipation of a circuit. Masking is only effective on the condition that the in...
Zhimin Chen, Patrick Schaumont
ICASSP
2008
IEEE
15 years 10 months ago
Compressive wireless arrays for bearing estimation
Joint processing of sensor array outputs improves the performance of parameter estimation and hypothesis testing problems beyond the sum of the individual sensor processing result...
Volkan Cevher, Ali Cafer Gurbuz, James H. McClella...
FOCS
2007
IEEE
15 years 10 months ago
Lower Bounds on Signatures From Symmetric Primitives
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most 2(1+o(1))q , where q is the total number of oracle queries a...
Boaz Barak, Mohammad Mahmoody-Ghidary
GLOBECOM
2007
IEEE
15 years 10 months ago
A Proactive Network Coding Strategy for Pervasive Wireless Networking
— In recent years, network coding has proved to be an efficient tool to disseminate data through a network. A number of practical schemes have been proposed to implement network...
Elena Fasolo, Michele Rossi, Jörg Widmer, Mic...
HICSS
2007
IEEE
138views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Probabilistic Graphical Approach to Computing Electricity Price Duration Curves under Price and Quantity Competition
Abstract— The electricity price duration curve (EPDC) represents the probability distribution function of the electricity price considered as a random variable. The price uncerta...
Pascal Michaillat, Shmuel S. Oren