Sciweavers

1628 search results - page 238 / 326
» Compiler Construction Using Scheme
Sort
View
IWNAS
2008
IEEE
15 years 8 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
MUE
2008
IEEE
129views Multimedia» more  MUE 2008»
15 years 8 months ago
G3M: A Generalized Multimedia Data Model Based on MPEG-7
In this paper, a generalized multimedia database data model based on MPEG-7 named G3M is proposed and formally defined. Different from those XML Database Management System (DBMS) ...
Qiong Zuo, Zhongsheng Cao
ACISP
2007
Springer
15 years 8 months ago
TCHo: A Hardware-Oriented Trapdoor Cipher
This paper improves the Finiasz-Vaudenay construction of TCHo, a hardware-oriented public-key cryptosystem, whose security relies on the hardness of finding a low-weight multiple ...
Jean-Philippe Aumasson, Matthieu Finiasz, Willi Me...
GLOBECOM
2006
IEEE
15 years 8 months ago
Cyclic Codes Tailored to a Known Set of Error Patterns
— We propose a high-rate error-pattern control code based on a generator polynomial targeting a specific set of known dominant error patterns. This code is based on first const...
Jihoon Park, Jaekyun Moon
ICMCS
2006
IEEE
117views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Offering Differentiated Services in Peer-to-Peer Multimedia Multicast
In traditional overlay multicast network, all peers are treated as equal regardless of their importance and contribution to the network. In this paper, we consider that each user ...
Kan-Leung Cheng, Xing Jin, S.-H. Gary Chan