Sciweavers

1840 search results - page 310 / 368
» The Capacity of String-Duplication Systems
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
13 years 5 months ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
ICC
2009
IEEE
114views Communications» more  ICC 2009»
13 years 5 months ago
Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints
1 Transmission over wireless fading channels under quality of service (QoS) constraints is studied when only the receiver has perfect channel side information. Being unaware of the...
Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar
ICNS
2009
IEEE
13 years 5 months ago
HGRID: Fault Tolerant, Log2N Resource Management for Grids
Grid Resource Discovery Service is currently a very important focus of research. We propose a scheme that presents essential characteristics for efficient, self-configuring and fau...
Antonia Gallardo, Kana Sanjeevan, Luis Díaz...
AISS
2010
107views more  AISS 2010»
13 years 5 months ago
A Practical Method of Reducing the Gaps in e-Government Interoperability Implementation: Case of Patient Referral Information Ex
In recent years, e-government interoperability frameworks (e-GIFs) and enterprise architectures (EAs) have been extensively developed as mechanism tools for achieving the interope...
Apitep Saekow, Choompol Boonmee