Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2019

2019

We consider the problem of estimating the mean of a symmetric log-concave distribution under the following constraint: only a… Expand

2017

2017

Quantum digital signature (QDS) is an approach to guarantee the nonrepudiation, unforgeability, and transferability of a… Expand

2014

2014

In this paper, we propose a new encryption scheme for OFDM systems. The reason for physical layer approach is that it has the… Expand

2011

2011

This paper describes a new tree based anti-colli- sion algorithm for Radio Frequency Identification (RFID) systems. The proposed… Expand

2005

2005

AbstractThree main parameters characterize the efficiency of algorithms that solve the Consensus Problem: the ratio between the… Expand

Highly Cited

2005

Highly Cited

2005

Consider a situation where a set of distributed sensors and a fusion center wish to cooperate to estimate an unknown parameter… Expand

Highly Cited

2005

Highly Cited

2005

Consider a situation where a set of distributed sensors and a fusion center wish to cooperate to estimate an unknown parameter… Expand

2004

2004

Current SETI technology is hardly recognizable from the perspective of the discipline's first experiment more than forty years… Expand

2004

2004

We consider the decentralized estima- tion of a noise-corrupted deterministic parameter by a bandwidth constrained sensor network… Expand

Highly Cited

2002

Highly Cited

2002

Randomization is vital in cryptography: secret keys should be randomly generated and most cryptographic primitives (e.g… Expand