Sciweavers

18 search results - page 4 / 4
» Revisiting Fully Distributed Proxy Signature Schemes
Sort
View
SIGECOM
2005
ACM
90views ECommerce» more  SIGECOM 2005»
13 years 10 months ago
ICE: an iterative combinatorial exchange
We present the first design for a fully expressive iterative combinatorial exchange (ICE). The exchange incorporates a tree-based bidding language that is concise and expressive ...
David C. Parkes, Ruggiero Cavallo, Nick Elprin, Ad...
INFOCOM
2010
IEEE
13 years 3 months ago
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks
—IEEE 802.11-based mesh networks can yield a throughput distribution among nodes that is spatially biased, with traffic originating from nodes that directly communicate with the...
Vincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Ed...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
13 years 11 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang