Sciweavers

1720 search results - page 56 / 344
» eg 2008
Sort
View
TWC
2008
112views more  TWC 2008»
15 years 4 months ago
Service time analysis of a distributed medium access control scheme
Abstract--Distributed medium access control (MAC) is essential for a wireless network without a central controller. In previous work of the authors, a distributed MAC scheme has be...
Hai Jiang, Ping Wang, Weihua Zhuang, H. Vincent Po...
CCR
2000
78views more  CCR 2000»
15 years 4 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas
CGF
2002
123views more  CGF 2002»
15 years 4 months ago
A Frequency-Domain Approach to Watermarking 3D Shapes
This paper presents a robust watermarking algorithm with informed detection for 3D polygonal meshes. The algorithm is based on our previous algorithm [22] that employs mesh-spectr...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
CSUR
2000
61views more  CSUR 2000»
15 years 4 months ago
Framelets - small and loosely coupled frameworks
Not only the design of complex frameworks is hard, but also the reuse of such artefacts. Furthermore, the internal working of different frameworks is usually not compatible so that...
Wolfgang Pree, Kai Koskimies
DAM
2000
126views more  DAM 2000»
15 years 4 months ago
2-Medians in trees with pos/neg weights
This paper deals with facility location problems with pos=neg weights in trees. We consider two di erent objective functions which model two di erent ways to handle obnoxious faci...
Rainer E. Burkard, Eranda Çela, Helidon Dol...