Sciweavers

780 search results - page 36 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
96
Voted
CN
2006
75views more  CN 2006»
15 years 18 days ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
119
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Lattice-Based Blind Signatures
Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice problems, such as the shortest vector problem, as the bas...
Markus Rückert
CORR
2010
Springer
231views Education» more  CORR 2010»
14 years 10 months ago
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks
Scheduling is a critical and challenging resource allocation mechanism for multi-hop wireless networks. It is well known that scheduling schemes that give a higher priority to the ...
Bo Ji, Changhee Joo, Ness B. Shroff
SSIAI
2000
IEEE
15 years 5 months ago
Two-Dimensional Phase Unwrapping Using Neural Networks
Imaging systems that construct an image from phase information in received signals include synthetic aperture radar (SAR) and optical Doppler tomography (ODT) systems. A fundament...
Wade Schwartzkopf, Thomas E. Milner, Joydeep Ghosh...
DRMTICS
2005
Springer
15 years 6 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov