Search
Now showing items 1-10 of 13
Optimal Scalable Security Architectures in the Presence of Colluding Mobile Traitors
(1999)
We present the issues related to secure muiticast communication in the presence of members who may collaborate to compromise the integrity of the system's security. We also show that the ability to compartmentalize the ...
On the Use of Integer Programming Models in AI Planning
(1999)
Recent research has shown the promise of using propositional reasoning and search to solve AI planning problems. In this paper, we further explore this area by applying Integer Programming to solve AI planning problems. ...
VLSI Implemented ML Joint Carrier Phase and Timing Offsets Joint Estimator for QPSK/QQPSK Burst Modems
(1999)
A high performance ASIC supporting multiple modulation, error correction, and frame formats is under development at Hughes Network Systems, Inc. Powerful and generic data-aided (DA) estimators are needed to accommodate ...
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
(1999)
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications. <p>In this paper, we show that by assigning probabilities for member revocations, the optimality, ...
Dynamic Elgamal Public Key Generation with Tight Binding
(1999)
We present a new distributed, group ElGamal public key generation algorithm which also permits maintenance of a group-specific, dynamic, individual ElGamal public key infrastructure. We parameterize the group with a ...
VLSI Implemented Data-Aided ML Parameter Estimators of PSK Burst Modems
(1999)
A high performance Universal Modem ASIC that supports several modulation types and burst mode frame formats is under development. The ASIC is designed to work under stringent conditions such as large carrier frequency ...
An Information Theoretic Approach for Design and Analysis of Rooted-Tree Based Multicast Key Management Schemes
(1999)
Recent literature presents several rooted tree based member deletion/ revocation schemes trying to simultaneously minimize the key storage while providing efficient member deletion/revocation. Many of these approaches have ...
A Video Transmission System Based on a Human Visual Model
(1999)
This paper presents a joint source-channel coding scheme of digital video broadcasting over satellite channels. The video compression is based on a human visual model. A perceptual distortion model, the just-noticeable-distortion ...
Optimal Multilevel Feedback Policies for ABR Flow Control using Two Timescale SPSA
(1999)
Optimal multilevel feedback control policies for rate based flow controlin available bit rate (ABR) service in asynchronous transfer mode (ATM)networks are obtained in the presence of information and propagationdelays, ...
Data-Aided ML Parameter Estimators of PSK Burst Modems and Their Systolic VLSI Implementations
(1999)
A high performance Universal Modem ASIC that supports several modulation types and burst mode frame formats is under development. Powerful and generic data-aided (DA) parameter estimators are necessary to accommodate many ...