Sciweavers

5752 search results - page 1020 / 1151
» Informative Labeling Schemes
Sort
View
EUROPKI
2007
Springer
14 years 25 days ago
Time Capsule Signature: Efficient and Provably Secure Constructions
Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which allows a signature to bear a (future) time t so that t...
Bessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin ...
CVPR
2009
IEEE
14 years 25 days ago
Keypoint induced distance profiles for visual recognition
We show that histograms of keypoint descriptor distances can make useful features for visual recognition. Descriptor distances are often exhaustively computed between sets of keyp...
Tat-Jun Chin, David Suter
DCOSS
2009
Springer
14 years 25 days ago
MCP: An Energy-Efficient Code Distribution Protocol for Multi-Application WSNs
In this paper, we study the code distribution problem in multi-application wireless sensor networks (MA-WSNs), i.e., sensor networks that can support multiple applications. While M...
Weijia Li, Youtao Zhang, Bruce Childers
WCNC
2010
IEEE
14 years 25 days ago
Joint Optimization of Power Allocation and Relay Deployment in Wireless Sensor Networks
—We study the problem of optimizing the symbol error probability (SEP) performance of cluster-based cooperative wireless sensor networks (WSNs). It is shown in the literature tha...
Mohammad Abdizadeh, Hadi Jamali Rad, Bahman Abolha...
WCNC
2010
IEEE
14 years 25 days ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
« Prev « First page 1020 / 1151 Last » Next »