Sciweavers

2487 search results - page 133 / 498
» cases 2009
Sort
View
ICITS
2009
14 years 10 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ICITS
2009
14 years 10 months ago
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification
Abstract. The term indistinguishability amplification refers to a setting where a certain construction combines two (or more) cryptographic primitives of the same type to improve t...
Peter Gazi, Ueli Maurer
ICUMT
2009
14 years 10 months ago
Cooperative robust sequential detection algorithms for Spectrum Sensing in Cognitive Radio
Abstract-- We consider the problem of Spectrum Sensing in Cognitive Radio Networks. In our previous work we have developed DualCUSUM, a distributed algorithm for change detection a...
ArunKumar Jayaprakasam, Vinod Sharma
116
Voted
ICUMT
2009
14 years 10 months ago
Effective buffer and storage management in DTN nodes
Current wired networks have been developed on the basis of the AIMD principle, which offers increased performance and fairness. Nevertheless, there is a vast spectrum of networks, ...
Stylianos Dimitriou, Vassilis Tsaoussidis
98
Voted
HYBRID
2009
Springer
15 years 7 months ago
The Optimal Boundary and Regulator Design Problem for Event-Driven Controllers
Event-driven control systems provide interesting benefits such as reducing resource utilization. This paper formulates the optimal boundary and regulator design problem that minim...
Pau Martí, Manel Velasco, Enrico Bini