Sciweavers

530 search results - page 56 / 106
» Practical Threshold Signatures
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Dynamic node activation in networks of rechargeable sensors
— We consider a network of rechargeable sensors, deployed redundantly in a random sensing environment, and address the problem of how sensor nodes should be activated dynamically...
Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi
PIMRC
2008
IEEE
14 years 2 months ago
Decoding-based channel estimation for selective cooperation diversity protocols
— We describe and analyze Minimum Path Difference (MPD), a metric to improve threshold-based Selection Decodeand-Forward (SDF) protocols in cooperative wireless networks with cha...
Stefan Valentin, Tobias Volkhausen, Furuzan Atay O...
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 1 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
ICIP
2000
IEEE
14 years 9 months ago
A Novel Scheme for Image Rotation for Document Processing
Rotation of the binary image of a document page for correcting the skew in the case of OCR or signature verification systems entails disfigurement of the shape of the characters, ...
Kaushik Mahata, A. G. Ramakrishnan
RECOMB
2008
Springer
14 years 8 months ago
Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles
We present a method for identifying connected gene subnetworks significantly enriched for genes that are dysregulated in specimens of a disease. These subnetworks provide a signat...
Igor Ulitsky, Richard M. Karp, Ron Shamir