Sciweavers

526 search results - page 94 / 106
» On circularly symmetric functions
Sort
View
TWC
2008
125views more  TWC 2008»
13 years 9 months ago
Cooperative communications with relay-selection: when to cooperate and whom to cooperate with?
Abstract--In this paper, we propose a new cooperative communication protocol, which achieves higher bandwidth efficiency while guaranteeing the same diversity order as that of the ...
Ahmed S. Ibrahim, Ahmed K. Sadek, Weifeng Su, K. J...
COMGEO
2004
ACM
13 years 9 months ago
A multi-dimensional approach to force-directed layouts of large graphs
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...
CCR
2000
101views more  CCR 2000»
13 years 9 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
PE
2002
Springer
137views Optimization» more  PE 2002»
13 years 9 months ago
Analysis of two competing TCP/IP connections
Many mathematical models exist for describing the behavior of TCP/IP (TCP: transmission control protocol) under an exogenous loss process that does not depend on the window size. ...
Eitan Altman, Tania Jiménez, R. Nú&n...
TIP
2008
167views more  TIP 2008»
13 years 9 months ago
FIR Filter Banks for Hexagonal Data Processing
Images are conventionally sampled on a rectangular lattice, and they are also commonly stored as such a lattice. Thus, traditional image processing is carried out on the rectangula...
Q. Jiang