Sciweavers

31324 search results - page 6134 / 6265
» Compare
Sort
View
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
15 years 3 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
PAISI
2010
Springer
15 years 3 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
PIMRC
2010
IEEE
15 years 3 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
PIMRC
2010
IEEE
15 years 3 months ago
Cooperative interference-aware joint scheduling for the 3GPP LTE uplink
In current cellular networks base stations (BSs) usually perform independent scheduling without coordinating the resource allocation among different cells. This, however, often lea...
Philipp Frank, Andreas Müller 0001, Heinz Dro...
PIMRC
2010
IEEE
15 years 3 months ago
Improving link failure detection and response in IEEE 802.11 wireless ad hoc networks
Wireless multihop ad hoc networks face a multitude of challenging problems including highly dynamic multihop topologies, lossy and noisy communications channels, and sporadic conne...
Alvin C. Valera, Hwee-Pink Tan, Winston Khoon Guan...
« Prev « First page 6134 / 6265 Last » Next »