Sciweavers

2059 search results - page 11 / 412
» A Directed Threshold - Signature Scheme
Sort
View
IJNSEC
2011
77views more  IJNSEC 2011»
14 years 4 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
15 years 3 months ago
Performance Improvement of Vector Quantization by Using Threshold
Abstract. Vector quantization (VQ) is an elementary technique for image compression. However, the complexity of searching the nearest codeword in a codebook is time-consuming. In t...
Hung-Yi Chang, Pi-Chung Wang, Rong-Chang Chen, Shu...
ICDAR
1999
IEEE
15 years 2 months ago
Binarization of Document Images using Hadamard Multiresolution Analysis
In this article, we propose a new method that combines the use of a global threshold and a window-based scheme for computing local thresholds. The latter scheme compares the contr...
Fu Chang, Kung-Hao Liang, Tzu-Ming Tan, Wen-Liang ...
GLOBECOM
2008
IEEE
14 years 11 months ago
Outage Behavior of Cooperative Diversity with Relay Selection
Abstract—Cooperative diversity is a useful technique to increase reliability and throughput of wireless networks. To analyze the performance gain from cooperative diversity, outa...
Kampol Woradit, Tony Q. S. Quek, Watcharapan Suwan...
INFOCOM
2010
IEEE
14 years 8 months ago
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks
—IEEE 802.11-based mesh networks can yield a throughput distribution among nodes that is spatially biased, with traffic originating from nodes that directly communicate with the...
Vincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Ed...