Sciweavers

915 search results - page 60 / 183
» Proof labeling schemes
Sort
View
CN
2006
75views more  CN 2006»
13 years 8 months ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
FGCN
2007
IEEE
113views Communications» more  FGCN 2007»
14 years 2 months ago
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme
To keep the evidence that a stored hard disk does not modify its content, the intuitive scheme is to calculate a hash value of the data in all the sectors in a specific order. Ho...
Zoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu...
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
13 years 11 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth
PE
2008
Springer
108views Optimization» more  PE 2008»
13 years 8 months ago
Rate-optimal schemes for Peer-to-Peer live streaming
In this paper we consider the problem of sending data in real time from information sources to sets of receivers, using peer-to-peer communications. We consider several models of ...
Laurent Massoulié, Andrew Twigg
ICCV
2007
IEEE
14 years 2 months ago
A reliable skin mole localization scheme
Mole pattern changes are important cues in detecting melanoma at an early stage. As a first step to automatically register mole pattern changes from skin images, this paper prese...
Taeg Sang Cho, William T. Freeman, Hensin Tsao