Sciweavers

849 search results - page 89 / 170
» Completely Non-malleable Schemes
Sort
View
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 10 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
TSP
2008
99views more  TSP 2008»
13 years 10 months ago
Carrier Frequency Offset Mitigation in Asynchronous Cooperative OFDM Transmissions
Carrier frequency offset (CFO) mitigation is critical for orthogonal frequency-division multiplexing (OFDM)-based cooperative transmissions because even small CFO per transmitter m...
Xiaohua Li, Fan Ng, Taewoo Han
JPDC
2007
92views more  JPDC 2007»
13 years 10 months ago
Dynamically mapping tasks with priorities and multiple deadlines in a heterogeneous environment
In a distributed heterogeneous computing system, the resources have different capabilities and tasks have different requirements. To maximize the performance of the system, it is ...
Jong-Kook Kim, Sameer Shivle, Howard Jay Siegel, A...
CVPR
1998
IEEE
15 years 6 days ago
Making Good Features Track Better
This paper addresses robust feature tracking. We extend the well-known Shi-Tomasi-Kanade tracker by introducing an automatic scheme for rejecting spurious features. We employ a si...
Tiziano Tommasini, Andrea Fusiello, Emanuele Trucc...
ICIP
2000
IEEE
14 years 11 months ago
Cancellation of Show-Through in Duplex Scanning
When scanning a page with printing on both sides, the printing on the back-side often shows through in the scan of the front-side because the page is not completely opaque. This p...
Gaurav Sharma