Sciweavers

780 search results - page 96 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling
Magnetic resonance imaging (MRI) allows numerous Fourier domain sampling schemes such as Cartesian and non-Cartesian trajectories (e.g. Polar, circular, and spherical). On the oth...
Hassan Foroosh, Mais Alnasser, Murat Balci
INFOCOM
2002
IEEE
14 years 17 days ago
Using the Small-World Model to Improve Freenet Performance
– Efficient data retrieval in a peer-to-peer system like Freenet is a challenging problem. In this paper we study the impact of cache replacement policy on the performance of Fre...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan
EJWCN
2011
105views more  EJWCN 2011»
13 years 2 months ago
QoS-Aware Active Queue Management for Multimedia Services over the Internet
—Recently, the multimedia services such as IPTV, video conference emerges to be the main traffic source. When UDP coexists with TCP, it induces not only congestion collapse but a...
Bor-Jiunn Hwang, I-Shyan Hwang, Pen-Ming Chang
TSP
2010
13 years 2 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
JOC
2007
133views more  JOC 2007»
13 years 7 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin