Sciweavers

1610 search results - page 260 / 322
» Identity Based Multisignatures
Sort
View
ICB
2007
Springer
139views Biometrics» more  ICB 2007»
14 years 1 months ago
Tracking and Recognition of Multiple Faces at Distances
Many applications require tracking and recognition of multiple faces at distances, such as in video surveillance. Such a task, dealing with non-cooperative objects is more challeng...
Rong Liu, Xiufeng Gao, Rufeng Chu, XiangXin Zhu, S...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 1 months ago
Channel-Matched Spreading Codes for the Downlink of MC-CDMA
Abstract-- This paper concerns the multiple access performance of spreading codes used in the downlink of multicarrier code-division multiple-access (MC-CDMA). Complex-valued sprea...
Qinghua Shi, Yong Liang Guan, Choi Look Law
ALGOSENSORS
2006
Springer
14 years 1 months ago
Self-deployment Algorithms for Mobile Sensors on a Ring
Abstract. We consider the self-deployment problem in a ring for a network of identical sensors: starting from some initial random placement in the ring, the sensors in the network ...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro
CNSR
2004
IEEE
153views Communications» more  CNSR 2004»
14 years 1 months ago
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which requires less computation than a previously proposed scheme suggesting identity...
Muhammad J. Bohio, Ali Miri
ATAL
2006
Springer
14 years 1 months ago
False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation
This paper develops a new combinatorial auction protocol called the Groves Mechanism with SubModular Approximation (GM-SMA). This protocol satisfies the following characteristics:...
Makoto Yokoo, Toshihiro Matsutani, Atsushi Iwasaki