Sciweavers

1259 search results - page 250 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 5 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
IPPS
2003
IEEE
14 years 1 months ago
Contact-Based Architecture for Resource Discovery (CARD) in Large Scale MANets
In this paper we propose a novel architecture, CARD, for resource discovery in large scale MANets that may scale up to thousands of nodes. Our mechanism is suitable for resource d...
Ahmed Helmy, Saurabh Garg, Priyatham Pamu, Nitin N...
MOBICOM
2010
ACM
13 years 8 months ago
Indoor localization without the pain
While WiFi-based indoor localization is attractive, the need for a significant degree of pre-deployment effort is a key challenge. In this paper, we ask the question: can we perfo...
Krishna Chintalapudi, Anand Padmanabha Iyer, Venka...
CVPR
2009
IEEE
2452views Computer Vision» more  CVPR 2009»
15 years 3 months ago
CHoG: Compressed Histogram of Gradients: A Low Bit-Rate Feature Descriptor
Establishing visual correspondences is an essential component of many computer vision problems, and is often done with robust, local feature-descriptors. Transmission and storag...
Vijay Chandrasekhar (Stanford University), Gabriel...
SECON
2010
IEEE
13 years 5 months ago
Utility-Based Gateway Deployment for Supporting Multi-Domain DTNs
Abstract--Due to technology or policy constraints, communications across network domains usually require the intervention of gateways, and their proper deployment is crucial to the...
Ting He, Kang-Won Lee, Nikoletta Sofra, Kin K. Leu...