Sciweavers

625 search results - page 18 / 125
» Generalized Ring Signatures
Sort
View
ICIP
2007
IEEE
14 years 9 months ago
Online Parsing of Sports Coaching Video Through Intrinsic Motion Analysis
Automatic record and review of actions in sports training sessions is of great benefit to both coach and athlete. Many coaching sessions involve repetition of particular actions t...
Dan Ring, Anil C. Kokaram
INFOCOM
1999
IEEE
13 years 11 months ago
Ring versus Tree Embedding for Real-time Group Multicast
In general topology networks, routing from one node to another over a tree embedded in the network is intuitively a good strategy, since it typically results in a route length of O...
Mario Baldi, Yoram Ofek
MSWIM
2003
ACM
14 years 22 days ago
Flooding strategy for target discovery in wireless networks
In this paper, we address a fundamental problem concerning the best flooding strategy to minimize cost and latency for target discovery in wireless networks. Should we flood the ...
Zhao Cheng, Wendi Beth Heinzelman
JSC
1998
68views more  JSC 1998»
13 years 7 months ago
An Algorithm for Computing the Integral Closure
We present an algorithm for computing the integral closure of a reduced ring that is finitely generated over a finite field. Leonard and Pellikaan [4] devised an algorithm for c...
Theo De Jong
JNW
2006
149views more  JNW 2006»
13 years 7 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo