Sciweavers

CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 14 hour ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
109
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 14 hour ago
Extended Two-Dimensional PCA for Efficient Face Representation and Recognition
In this paper a novel method called Extended TwoDimensional PCA (E2DPCA) is proposed which is an extension to the original 2DPCA. We state that the covariance matrix of 2DPCA is e...
Mehran Safayani, Mohammad Taghi Manzuri Shalmani, ...
CORR
2010
Springer
74views Education» more  CORR 2010»
15 years 14 hour ago
Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids
We study matroidal networks introduced by Dougherty et al., who showed that if a network is scalar-linearly solvable over some finite field, then the network is a matroidal network...
Anthony Kim, Muriel Médard
39
Voted
CORR
2010
Springer
47views Education» more  CORR 2010»
15 years 14 hour ago
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel, Ray A. Perlner
CORR
2010
Springer
65views Education» more  CORR 2010»
15 years 14 hour ago
Iterative method for improvement of coding and decryption
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be ...
Natasa Zivic
CORR
2010
Springer
91views Education» more  CORR 2010»
15 years 14 hour ago
Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks
Two-ray ground reflection model has been widely used as the propagation model to investigate the performance of an ad hoc network. But two-ray model is too simple to represent a r...
Anwar Hossain, Mohammed Tarique, Rumana Islam
43
Voted
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 14 hour ago
A student's guide to searching the literature using online databases
Casey W. Miller, Michelle D. Chabot, Troy C. Messi...
99
Voted
CORR
2010
Springer
137views Education» more  CORR 2010»
15 years 14 hour ago
LEXSYS: Architecture and Implication for Intelligent Agent systems
s LEXSYS, (Legume Expert System) was a project conceived at IITA (International Institute of Tropical Agriculture) Ibadan Nigeria. It was initiated by the COMBS (Collaborative Grou...
Charles A. B. Robert
31
Voted
CORR
2010
Springer
46views Education» more  CORR 2010»
15 years 14 hour ago
Limits of Commutativity on Abstract Data Types
Carmelo Malta, José Martinez