Sciweavers

2143 search results - page 379 / 429
» corr 2010
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 9 months ago
NLHB : A Non-Linear Hopper Blum Protocol
The Hopper-Blum (HB) protocol, which uses noised linear parities of a shared key for authentication, has been proposed for light-weight applications such as RFID. Recently, algorit...
Mukundan Madhavan, Andrew Thangaraj, Yogesh Sankar...
86
Voted
CORR
2010
Springer
54views Education» more  CORR 2010»
14 years 9 months ago
Channel Decoding with a Bayesian Equalizer
In this paper we show that, in case of uncertainties during the estimation, overconfident posterior probabilities tend to mislead the performance of soft-decoders. Maximum likeliho...
Luis Salamanca, Juan José Murillo-Fuentes, ...
90
Voted
CORR
2010
Springer
98views Education» more  CORR 2010»
14 years 9 months ago
Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks
Abstract--This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices...
Samir Medina Perlaza, Hamidou Tembine, Samson Lasa...
CORR
2010
Springer
197views Education» more  CORR 2010»
14 years 9 months ago
Interference Alignment Through User Cooperation for Two-cell MIMO Interfering Broadcast Channels
This paper focuses on two-cell multiple-input multiple-output (MIMO) Gaussian interfering broadcast channels (MIMO-IFBC) with K cooperating users on the cellboundary of each BS. It...
Wonjae Shin, Namyoon Lee, Jong Bu Lim, Changyong S...
110
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 7 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...