Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

One-bit message

Known as: One bit message 
A one-bit message is a type of communication that has no personalized or specified content, and as such transmits only a single binary bit of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
We consider the problem of estimating the mean of a symmetric log-concave distribution under the following constraint: only a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2017
2017
Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability, and transferability of a… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • table 2
2014
2014
  • F. Huo, G. Gong
  • IEEE INFOCOM - IEEE Conference on Computer…
  • 2014
  • Corpus ID: 17720145
In this paper, we propose a new encryption scheme for OFDM systems. The reason for physical layer approach is that it has the… Expand
  • figure 3
  • figure 5
  • table I
  • figure 4
  • table II
2011
2011
This paper describes a new tree based anti-colli- sion algorithm for Radio Frequency Identification (RFID) systems. The proposed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2005
2005
AbstractThree main parameters characterize the efficiency of algorithms that solve the Consensus Problem: the ratio between the… Expand
  • figure 3
Highly Cited
2005
Highly Cited
2005
Consider a situation where a set of distributed sensors and a fusion center wish to cooperate to estimate an unknown parameter… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2005
Highly Cited
2005
  • Z. Luo
  • IEEE Trans. Inf. Theory
  • 2005
  • Corpus ID: 122703809
Consider a situation where a set of distributed sensors and a fusion center wish to cooperate to estimate an unknown parameter… Expand
2004
2004
Current SETI technology is hardly recognizable from the perspective of the discipline's first experiment more than forty years… Expand
2004
2004
We consider the decentralized estima- tion of a noise-corrupted deterministic parameter by a bandwidth constrained sensor network… Expand
Highly Cited
2002
Highly Cited
2002
Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g… Expand