Sciweavers

780 search results - page 36 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
CN
2006
75views more  CN 2006»
13 years 7 months ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
ASIACRYPT
2010
Springer
13 years 5 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
CORR
2010
Springer
231views Education» more  CORR 2010»
13 years 5 months ago
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks
Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It is well known that scheduling schemes that give a higher priority to the ...
Bo Ji, Changhee Joo, Ness B. Shroff
SSIAI
2000
IEEE
14 years 6 days ago
Two-Dimensional Phase Unwrapping Using Neural Networks
Imaging systems that construct an image from phase information in received signals include synthetic aperture radar (SAR) and optical Doppler tomography (ODT) systems. A fundament...
Wade Schwartzkopf, Thomas E. Milner, Joydeep Ghosh...
DRMTICS
2005
Springer
14 years 1 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov