Sciweavers

2059 search results - page 271 / 412
» A Directed Threshold - Signature Scheme
Sort
View
PIMRC
2010
IEEE
15 years 2 months ago
Communication cost analysis of MBSFN in LTE
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
154
Voted
WD
2010
15 years 2 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
CAIP
2009
Springer
182views Image Analysis» more  CAIP 2009»
15 years 2 months ago
Atmospheric Visibility Monitoring Using Digital Image Analysis Techniques
Atmospheric visibility is a standard of human visual perception of the environment. It is also directly associated with air quality, polluted species and climate. The influence of ...
Jiun-Jian Liaw, Ssu-Bin Lian, Yung-Fa Huang, Rung ...
PE
2011
Springer
214views Optimization» more  PE 2011»
14 years 11 months ago
Time-bounded reachability in tree-structured QBDs by abstraction
Structured QBDs by Abstraction Daniel Klink, Anne Remke, Boudewijn R. Haverkort, Fellow, IEEE, and Joost-Pieter Katoen, Member, IEEE Computer Society —This paper studies quantita...
Daniel Klink, Anne Remke, Boudewijn R. Haverkort, ...
154
Voted
TIT
2011
125views more  TIT 2011»
14 years 11 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud