Sciweavers

299 search results - page 11 / 60
» Use of Pricing Schemes for Differentiating Information Goods
Sort
View
FC
2004
Springer
105views Cryptology» more  FC 2004»
14 years 26 days ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
MOBICOM
2010
ACM
13 years 7 months ago
Differential forms for target tracking and aggregate queries in distributed networks
Consider mobile targets moving in a plane and their movements being monitored by a network such as a field of sensors. We develop distributed algorithms for in-network tracking an...
Rik Sarkar, Jie Gao
ICPR
2004
IEEE
14 years 8 months ago
An Image Watermarking Scheme using HVS Characteristics and Spread Transform
The paper presents a robust digital image watermarking scheme that uses both the characteristics of the human visual system (HVS) and statistical information measure. Spread trans...
Malay Kumar Kundu, Santi P. Maity
TCOM
2008
115views more  TCOM 2008»
13 years 7 months ago
Differentiated rate scheduling for the down-link of cellular systems
We consider the problem of differentiated rate scheduling for the downlink (i.e., multi-antenna broadcast channel), in the sense that the rates required by different users must sat...
Amir F. Dana, Masoud Sharif, Ali Vakili, Babak Has...
KIVS
2005
Springer
14 years 29 days ago
Token-Based Accounting for P2P-Systems
Abstract This paper presents a token-based accounting scheme for decentralized autonomous systems, such as peer-to-peer systems. The scheme uses tokens as proof of resource or serv...
Nicolas Liebau, Vasilios Darlagiannis, Andreas Mau...