Sciweavers

204 search results - page 19 / 41
» el 2006
Sort
View
IJNSEC
2007
107views more  IJNSEC 2007»
14 years 11 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu
INFOCOM
2006
IEEE
15 years 5 months ago
Optimal Hopping in Ad Hoc Wireless Networks
— Gupta and Kumar showed that throughput in a static random wireless network increases with the amount of hopping. In a subsequent paper (2004), it was shown that although throug...
Abbas El Gamal, James P. Mammen
ISCAS
2006
IEEE
92views Hardware» more  ISCAS 2006»
15 years 5 months ago
The optimal MAC layer for low-power UWB is non-coordinated
— We consider the design of the MAC layer for low power, low data-rate, impulse-radio ultra-wide band (IRUWB) networks. In such networks, the primary concern is energy consumptio...
Ruben Merz, Alaeddine El Fawal, Jean-Yves Le Boude...
COLT
2006
Springer
15 years 3 months ago
Stable Transductive Learning
Abstract. We develop a new error bound for transductive learning algorithms. The slack term in the new bound is a function of a relaxed notion of transductive stability, which meas...
Ran El-Yaniv, Dmitry Pechyony
ECAI
2006
Springer
15 years 3 months ago
Prevention of Harmful Behaviors Within Cognitive and Autonomous Agents
Being able to ensure that a multiagent system will not generate undesirable behaviors is essential within the context of critical applications (embedded systems or real-time system...
Caroline Chopinaud, Amal El Fallah-Seghrouchni, Pa...