Sciweavers

1010 search results - page 4 / 202
» Computational Differences between Asymmetrical and Symmetric...
Sort
View
82
Voted
ICPR
2006
IEEE
15 years 10 months ago
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
We propose a novel biometrics cryptosystem where one can send and receive secure information using just the fingerprints. This cryptosystem is a judicious blend of the asymmetric ...
Abhishek Nagar, Santanu Chaudhury
TPDS
2010
155views more  TPDS 2010»
14 years 7 months ago
Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation
—Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these s...
Jing Zhao, Ping Zhang, Guohong Cao, Chita R. Das
83
Voted
ICASSP
2010
IEEE
14 years 9 months ago
Robust similarity metrics between audio signals based on asymmetrical spectral envelope matching
In this paper, a new type of metric that defines the similarity between musical audio signals is proposed. Based on the spectral flatness criterion, those metrics achieve low co...
Mathieu Lagrange, Roland Badeau, Gaël Richard
DCC
2005
IEEE
15 years 9 months ago
One (96, 20, 4)-symmetric Design and related Nonabelian Difference Sets
New (96, 20, 4)-symmetric design has been constructed, unique under the assumption of an automorphism group of order 576 action. The correspondence between a (96, 20, 4)-symmetric ...
Anka Golemac, Tanja Vucicic, Josko Mandic
77
Voted
CCR
2010
132views more  CCR 2010»
14 years 7 months ago
Scafida: a scale-free network inspired data center architecture
Data centers have a crucial role in current Internet architecture supporting content-centric networking. State-of-theart data centers have different architectures like fat-tree [1...
László Gyarmati, Tuan Anh Trinh