Sciweavers

4805 search results - page 155 / 961
» On the Analysis of Indexing Schemes
Sort
View
VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 6 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
SMI
2008
IEEE
255views Image Analysis» more  SMI 2008»
14 years 2 months ago
GPU-accelerated surface denoising and morphing with lattice Boltzmann scheme
In this paper, we introduce a parallel numerical scheme, the lattice Boltzmann method, to shape modeling applications. The motivation of using this originally-designed fluid dyna...
Ye Zhao
GLOBECOM
2007
IEEE
14 years 2 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
JMM2
2007
123views more  JMM2 2007»
13 years 8 months ago
An Assignment Scheme to Control Multiple Pan/Tilt Cameras for 3D Video
— This paper presents an assignment scheme to control multiple Pan/Tilt (PT) cameras for 3D video of a moving object. The system combines static wide field of view (FOV) cameras...
Sofiane Yous, Norimichi Ukita, Masatsugu Kidode
DCC
2003
IEEE
14 years 7 months ago
On the Security of Digital Signature Schemes Based on Error-Correcting Codes
In this paper we discuss the security of digital signature schemes based on error? correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to e...
Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg