Sciweavers

849 search results - page 89 / 170
» Completely Non-malleable Schemes
Sort
View
IJNSEC
2007
157views more  IJNSEC 2007»
15 years 4 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
TSP
2008
99views more  TSP 2008»
15 years 4 months ago
Carrier Frequency Offset Mitigation in Asynchronous Cooperative OFDM Transmissions
Carrier frequency offset (CFO) mitigation is critical for orthogonal frequency-division multiplexing (OFDM)-based cooperative transmissions because even small CFO per transmitter m...
Xiaohua Li, Fan Ng, Taewoo Han
JPDC
2007
92views more  JPDC 2007»
15 years 4 months ago
Dynamically mapping tasks with priorities and multiple deadlines in a heterogeneous environment
In a distributed heterogeneous computing system, the resources have different capabilities and tasks have different requirements. To maximize the performance of the system, it is ...
Jong-Kook Kim, Sameer Shivle, Howard Jay Siegel, A...
CVPR
1998
IEEE
16 years 6 months ago
Making Good Features Track Better
This paper addresses robust feature tracking. We extend the well-known Shi-Tomasi-Kanade tracker by introducing an automatic scheme for rejecting spurious features. We employ a si...
Tiziano Tommasini, Andrea Fusiello, Emanuele Trucc...
ICIP
2000
IEEE
16 years 6 months ago
Cancellation of Show-Through in Duplex Scanning
When scanning a page with printing on both sides, the printing on the back-side often shows through in the scan of the front-side because the page is not completely opaque. This p...
Gaurav Sharma