Sciweavers

3190 search results - page 59 / 638
» cans 2011
Sort
View
114
Voted
TIT
2011
128views more  TIT 2011»
14 years 7 months ago
Secure Network Coding on a Wiretap Network
—In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the netw...
Ning Cai, Raymond W. Yeung
TIT
2011
125views more  TIT 2011»
14 years 7 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
158
Voted
TNN
2011
126views more  TNN 2011»
14 years 7 months ago
Video Time Encoding Machines
—We investigate architectures for time encoding and time decoding of visual stimuli such as natural and synthetic video streams (movies, animation). The architecture for time enc...
Aurel A. Lazar, Eftychios A. Pnevmatikakis
116
Voted
TSE
2011
180views more  TSE 2011»
14 years 7 months ago
Developing a Single Model and Test Prioritization Strategies for Event-Driven Software
—Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and web applications. These EDS pose a challenge to testing because there are a la...
Renée C. Bryce, Sreedevi Sampath, Atif M. M...
91
Voted
TSP
2011
104views more  TSP 2011»
14 years 7 months ago
Decentralized Particle Filter With Arbitrary State Decomposition
—In this paper, a new particle filter (PF) which we refer to as the decentralized PF (DPF) is proposed. By first decomposing the state into two parts, the DPF splits the filte...
Tianshi Chen, Thomas B. Schön, Henrik Ohlsson...