Filters








52 Hits in 4.0 sec

On the Design Dilemma in Dining Cryptographer Networks [chapter]

Jens O. Oberender, Hermann de Meer
<span title="">2008</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In a Dining Cryptographers network, the anonymity level raises with the number of participating users. This paper studies strategic behavior based on game theory.  ...  Additionally, conflicting goals of participants result in dilemma games.  ...  Modeling Dining Cryptographer Networks The Dining Cryptographers (DC) protocol provides anonymity of the sender [7] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-85735-8_16">doi:10.1007/978-3-540-85735-8_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/t33roktrfrarjmseigxylsrmui">fatcat:t33roktrfrarjmseigxylsrmui</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810102825/http://www.fim.uni-passau.de/fileadmin/files/lehrstuhl/meer/publications/pdf/Oberender2008a.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/83/92837a24b1afd4676ddd64d8291f64271e50e0db.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-85735-8_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The topology of covert conflict [article]

Shishir Nagaraja
<span title="2006-01-23">2006</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our models thus build a bridge between network analysis and evolutionary game theory, and provide a framework for analysing defence and attack in networks where topology matters.  ...  We extend this work to the dynamic case by developing a framework based on evolutionary game theory to explore the interaction of attack and defence strategies.  ...  The first author was supported by a scholarship from the Gates Trust.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/0601101v1">arXiv:cs/0601101v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p42hr3toxrcidhinnrbjw6ao7y">fatcat:p42hr3toxrcidhinnrbjw6ao7y</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-cs0601101/cs0601101.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/48/0d48ee94c9ae413dcb3a722f592736b962235957.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/cs/0601101v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The computer for the 21st century: present security & privacy challenges

Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
<span title="">2018</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bb6biifh2vgodnm4pohs33dggi" style="color: black;">Journal of Internet Services and Applications</a> </i> &nbsp;
Decades went by since Mark Weiser published his influential work on the computer of the 21st century.  ...  In this paper, we address major challenges from areas that most afflict the UbiComp revolution: 1. Software Protection: weakly typed languages, polyglot software, and networked embedded systems. 2.  ...  However, a successful attack on cryptographic security properties is usually disastrous due to the risk concentrated in cryptographic primitives.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13174-018-0095-2">doi:10.1186/s13174-018-0095-2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ictrcm6ahng4hccfqeqh7surti">fatcat:ictrcm6ahng4hccfqeqh7surti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191205011945/https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-018-0095-2" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/30/5c/305c42298fc68f174f394cf1f52329ae8ee462e1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13174-018-0095-2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
<span title="">1998</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We place an electronic version of this journal in the public domain one year after publication.  ...  Conference proceedings from which only one or two papers have been abstracted are cited inline in the review.  ...  author gives some examples of how basic ideas from cryptology, ranging from monoalphabetics to the dining cryptographers' problem, can be used in teaching young children various concepts of number and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-69710-1_10">doi:10.1007/3-540-69710-1_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mezaspbmk5c4nhu227gayoeejq">fatcat:mezaspbmk5c4nhu227gayoeejq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190303070145/http://pdfs.semanticscholar.org/b150/f4b3cd216191568edfc743466a88183c4845.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/50/b150f4b3cd216191568edfc743466a88183c4845.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-69710-1_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Privacy-Preserving Machine Learning: Methods, Challenges and Directions [article]

Runhua Xu, Nathalie Baracaldo, James Joshi
<span title="2021-09-22">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In particular, existing PPML research cross-cut ML, systems and applications design, as well as security and privacy areas; hence, there is a critical need to understand state-of-the-art research, related  ...  designing various PPML architectures.  ...  For instance, dining cryptographer networks (DC-nets) [113] or mix-nets [114] are a sort of anonymous communication network in which only one person can send an anonymous message at a time.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.04417v2">arXiv:2108.04417v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pmxmsbs2gvh6nd4jadcz4dnsrq">fatcat:pmxmsbs2gvh6nd4jadcz4dnsrq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210925014159/https://arxiv.org/pdf/2108.04417v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/44/d5440641d03c1163f04d0965da452a8700880d70.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.04417v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A lightweight framework for cross-application user monitoring

K.D. Fenstermacher, M. Ginsburg
<span title="">2002</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dsrvu6bllzai7oj3hktnc5yf4q" style="color: black;">Computer</a> </i> &nbsp;
The human-computer interaction community has often focused on the face applications present to the user.  ...  The authors present a new framework that monitors higher-level events to learn how people access, create and modify information rather than how they use applications.  ...  Transparent monitoring in the workplace, however, presents ethical dilemmas.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/2.989930">doi:10.1109/2.989930</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jtirwfv6hjafph6bfyexjsbxx4">fatcat:jtirwfv6hjafph6bfyexjsbxx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040509172005/http://eller.arizona.edu:80/~kurtf/writing/IEEE-Computer-March-2002.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/ba/a9baf2a7357880af7a6f65047094f738155a84af.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/2.989930"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

PAS-MC: Privacy-preserving Analytics Stream for the Mobile Cloud [article]

Josh Joy, Mario Gerla
<span title="2016-04-17">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
dilemma.  ...  As data owners constantly generate data on their personal devices, the tension of storing private data on their own devices yet allowing third party analysts to perform aggregate analytics yields an interesting  ...  Chaum's Dining Cryptographers [13] was one of the first anonymity systems which was fully peer-to-peer and is also information-theoretically anonymous.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1604.04892v1">arXiv:1604.04892v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7jlfkxxscngindcmbj2ybidgri">fatcat:7jlfkxxscngindcmbj2ybidgri</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200822142154/https://arxiv.org/pdf/1604.04892v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/d2/fcd2acddec5d20076dcfe384ede4cba23e6ea552.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1604.04892v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2020.3033665">doi:10.1109/comst.2020.3033665</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hcrsvvkb2ffmbdlspshy66wg2y">fatcat:hcrsvvkb2ffmbdlspshy66wg2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717075326/https://ieeexplore.ieee.org/ielx7/9739/9361471/09239372.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/74/bf/74bf503c8986ba2eddff44ef43619d0ca043442d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2020.3033665"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
<span title="2020-08-05">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The SRA contains four layers: (1) the network layer, (2) the consensus layer, (3) the replicated state machine layer, and (4) the application layer.  ...  Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  Finally, the authors propose an extension of their scheme to support the anonymity of all bidders by blinding RSA signatures and Dining Cryptographers (DC) network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.09775v2">arXiv:1910.09775v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xvxnekjhtbbt7dc4b3kxy3m6xi">fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201011032643/https://arxiv.org/pdf/1910.09775v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/77/8a77c827bd5fdbeebbde223590fc340c012a03e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.09775v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems [article]

Miguel E. Andrés
<span title="2011-11-09">2011</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our last major contribution is a debugging technique that helps on the detection of flaws in security protocols.  ...  Since in practice anonymity protocols always leak some information, we focus on quantitative properties, which capture the amount of information leaked by a protocol.  ...  An Application: Dining Cryptographers Now we show how to apply the proof technique presented in this section to the Dining Cryptographers protocol.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1111.2760v1">arXiv:1111.2760v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bga6xxx3knhwzmhhsbudcslm7y">fatcat:bga6xxx3knhwzmhhsbudcslm7y</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1111.2760/1111.2760.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1111.2760v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

The contradictions of digital modernity

Kieron O'Hara
<span title="2018-04-25">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xyenpih6f5baxjd4zs4267izoy" style="color: black;">AI &amp; Society: The Journal of Human-Centred Systems and Machine Intelligence</a> </i> &nbsp;
This paper explores the concept of digital modernity, the extension of narratives of modernity with the special affordances of digital networked technology.  ...  The paper argues that digital modernity has two dimensions, of progression through time and progression through space, and these two dimensions can be in contradiction.  ...  distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00146-018-0843-7">doi:10.1007/s00146-018-0843-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qtvarq4livhczfd4lnggdqjtkm">fatcat:qtvarq4livhczfd4lnggdqjtkm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719092259/https://eprints.soton.ac.uk/420006/2/10.1007_2Fs00146_018_0843_7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6a/be/6abe740d2dc42b879bd06746a77a8091cb120264.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00146-018-0843-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Java Across Different Curricula, Courses and Countries Using a Common Pool of Teaching Material

Mirjana IVANOVIĆ, Zoran BUDIMAC, Anastas MISHEV, Klaus BOTHE, Ioan JURCA
<span title="2013-04-15">2013</span> <i title="Vilnius University Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/osbyyjgic5ajveytzyb7ztbu3q" style="color: black;">Informatics in Education. An International Journal</a> </i> &nbsp;
The available pool of common teaching materials can be used in a wide range of university courses in participating countries.  ...  In this paper we share some of the results and experiences collected during the subproject that come from intensive use of the prepared teaching materials for a variety of Java topics in different countries  ...  III47003: "Infrastructure for Technology Enhanced Learning in Serbia".  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15388/infedu.2013.11">doi:10.15388/infedu.2013.11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k53gpsge4bc7fhslzkccinnfqa">fatcat:k53gpsge4bc7fhslzkccinnfqa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200724202951/https://infedu.vu.lt/journal/INFEDU/article/424/file/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8d/64/8d64696a70ccfd99db1f0daf81880c89c00f9ebe.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.15388/infedu.2013.11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Integrating the Supply Chain with RFID: A Technical and Business Analysis

Zaheeruddin Asif, Munir Mandviwalla
<span title="">2005</span> <i title="Association for Information Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3kocyo3l3zdxdhhey2xm7pjnpy" style="color: black;">Communications of the Association for Information Systems</a> </i> &nbsp;
The use of RFID technology is expected to increase rapidly in the next few years.  ...  This paper presents an in-depth analysis of the technical and business implications of adopting Radio Frequency Identification (RFID) in organizational settings.  ...  Therefore it is a challenge to design adequate cryptographic algorithms for data security [Sarma, Weis et al., 2002] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1cais.01524">doi:10.17705/1cais.01524</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pwvxqtnzcfhubo6ougqdb6dfcq">fatcat:pwvxqtnzcfhubo6ougqdb6dfcq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428054716/https://aisel.aisnet.org/cgi/viewcontent.cgi?article=3146&amp;context=cais" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/73/d77362641730d30f9c0082b3e3973d621b7f00c3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1cais.01524"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Design of large polyphase filters in the Quadratic Residue Number System

Gian Carlo Cardarilli, Alberto Nannarelli, Yann Oster, Massimo Petricca, Marco Re
<span title="">2010</span> <i title="IEEE"> 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers </i> &nbsp;
In this paper, we focus on the frame corruption estimation method used in the design.  ...  This result opens the possibility for the design of new systems and network protocols based on FD radios.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acssc.2010.5757589">doi:10.1109/acssc.2010.5757589</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ccxnu5owr5fyrcjcqukumerueq">fatcat:ccxnu5owr5fyrcjcqukumerueq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722035510/http://www.asilomarssc.org/asil10/prog10/BookAbstracts.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/65/1f/651f669659be4f5528bc05c7017312e4c03acc81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/acssc.2010.5757589"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Prometheus wired: the hope for democracy in the age of network technology

<span title="2001-01-01">2001</span> <i title="American Library Association"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pjjljho22jhnrmpk3k2jxhxzv4" style="color: black;">ChoiceReviews</a> </i> &nbsp;
Personal correspondence, 22 November 1995. technology and politics to bear on a number of the questions facing us as we head into the age of networks.  ...  Hope frees our minds so they can set to work on freeing our bodies. Fire was a means but, without the support of hope, its flames could be contained. In the face of hope, Zeus was doomed.  ...  Typically, work sites in the home are not even separated physically from general living and social spaces, with networked terminals set up in bedrooms, dining areas or family rooms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5860/choice.38-2996">doi:10.5860/choice.38-2996</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r6oqbybt7rhx5acnwrai6rszny">fatcat:r6oqbybt7rhx5acnwrai6rszny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428095250/https://tspace.library.utoronto.ca/bitstream/1807/12707/1/nq41008.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/92/f6/92f69908e8c810b2acfd847093e2e45afe64f5dc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5860/choice.38-2996"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 52 results