Sciweavers

790 search results - page 116 / 158
» Hierarchical Group Signatures
Sort
View
PRL
2007
115views more  PRL 2007»
15 years 3 months ago
A decomposition scheme for 3D fuzzy objects based on fuzzy distance information
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
Stina Svensson
CEE
2011
106views more  CEE 2011»
14 years 7 months ago
LLACA: An adaptive localized clustering algorithm for wireless ad hoc networks
  Performance  of  ad  hoc  networks  dramatically  declines  as  network  grows.  Cluster  formation  in  which  the  network  hosts  are  hierarchically  part...
Javad Akbari Torkestani, Mohammad Reza Meybodi
DCC
2001
IEEE
16 years 3 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
ICDCS
2008
IEEE
15 years 10 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
111
Voted
COCO
2007
Springer
75views Algorithms» more  COCO 2007»
15 years 10 months ago
On the Theory of Matchgate Computations
Valiant has proposed a new theory of algorithmic computation based on perfect matchings and Pfaffians. We study the properties of matchgates—the basic building blocks in this n...
Jin-yi Cai, Vinay Choudhary, Pinyan Lu