Sciweavers

4805 search results - page 173 / 961
» On the Analysis of Indexing Schemes
Sort
View
IEEEICCI
2008
IEEE
14 years 2 months ago
Improved offline signature verification scheme using feature point extraction method
In this paper a novel offline signature verification scheme has been proposed. The scheme is based on selecting 60 feature points from the geometric centre of the signature and co...
Debasish Jena, Banshidhar Majhi, Saroj Kumar Panig...
ICCS
2007
Springer
14 years 2 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong
CSREASAM
2006
13 years 9 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
ICIP
2004
IEEE
14 years 10 months ago
A RST resilient object-based video watermarking scheme
In this paper, a blind object-based video watermarking scheme, which is robust to MPEG4 compression and normal video editing such as Rotation, Scaling or Translation (RST), is pro...
Dajun He, Qibin Sun
WIOPT
2006
IEEE
14 years 2 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi