Sciweavers

163 search results - page 21 / 33
» adhoc 2004
Sort
View
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
ICWN
2004
13 years 11 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild
FTDCS
2004
IEEE
14 years 1 months ago
Random Landmarking in Mobile, Topology-Aware Peer-to-Peer Networks
DHTs can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio betwee...
Rolf Winter, Thomas Zahn, Jochen H. Schiller
ECCV
2004
Springer
14 years 11 months ago
Reliable Fiducial Detection in Natural Scenes
Reliable detection of fiducial targets in real-world images is addressed in this paper. We show that even the best existing schemes are fragile when exposed to other than laborator...
David Claus, Andrew W. Fitzgibbon
CLEF
2005
Springer
14 years 3 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...