Sciweavers

6833 search results - page 1364 / 1367
» Some two-character sets
Sort
View
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
TIP
2010
113views more  TIP 2010»
13 years 2 months ago
Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
Multiplicative noise (also known as speckle noise) models are central to the study of coherent imaging systems, such as synthetic aperture radar and sonar, and ultrasound and laser...
José M. Bioucas-Dias, Mário A. T. Fi...
TMC
2010
103views more  TMC 2010»
13 years 2 months ago
Optimal Cooperative Relaying Schemes in IR-UWB Networks
Cooperation between wireless nodes to retransmit data for the other users introduces multiuser diversity to a wireless network and increases the system throughput. In this paper, t...
Ghasem Naddafzadeh Shirazi, Peng Yong Kong, Chen-K...
TOG
2010
117views more  TOG 2010»
13 years 2 months ago
Multi-feature matching of fresco fragments
We present a multiple-feature approach for determining matches between small fragments of archaeological artifacts such as Bronze-Age and Roman frescoes. In contrast with traditio...
Corey Toler-Franklin, Benedict J. Brown, Tim Weyri...
TON
2010
221views more  TON 2010»
13 years 2 months ago
Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network
Abstract--In communication networks, multiple disjoint communication paths are desirable for many applications. Such paths, however, may not exist in a network. In such a situation...
S. Q. Zheng, Jianping Wang, Bing Yang, Mei Yang
« Prev « First page 1364 / 1367 Last » Next »