Sciweavers

135 search results - page 13 / 27
» A New Self-Healing Key Distribution Scheme
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 3 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
ICIP
2006
IEEE
14 years 10 months ago
Mesh-Based Motion-Compensated Interpolation for Side Information Extraction in Distributed Video Coding
1 This paper addresses the problem of side information generation in distributed video compression (DVC) schemes. Intermediate frames constructed by motioncompensated interpolation...
Denis Kubasov, Christine Guillemot
AUTOMATICA
2010
96views more  AUTOMATICA 2010»
13 years 8 months ago
On resampling and uncertainty estimation in Linear System Identification
Linear System Identification yields a nominal model parameter, which minimizes a specific criterion based on the single inputoutput data set. Here we investigate the utility of va...
Simone Garatti, Robert R. Bitmead
WCW
2004
Springer
14 years 1 months ago
Distributed Hashtable on Pre-structured Overlay Networks
Internet overlay services must adapt to the substrate network topology and link properties to achieve high performance. A common overlay structure management layer is desirable fo...
Kai Shen, Yuan Sun
ISPAN
2005
IEEE
14 years 2 months ago
Secure Continuity for Sensor Networks
Addition of new nodes to a Sensor Network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when addi...
Arjan Durresi, Vijay Bulusu, Vamsi Paruchuri, Leon...