Sciweavers

1610 search results - page 63 / 322
» Identity Based Multisignatures
Sort
View
SIGCOMM
2006
ACM
15 years 7 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
70
Voted
ICASSP
2009
IEEE
15 years 8 months ago
Expectation-maximization algorithm for multi-pitch estimation and separation of overlapping harmonic spectra
This paper addresses the problem of multi-pitch estimation, which consists in estimating the fundamental frequencies of multiple harmonic sources, with possibly overlapping partia...
Roland Badeau, Valentin Emiya, Bertrand David
123
Voted
GLOBECOM
2008
IEEE
15 years 8 months ago
Passive Ultrawide Bandwidth RFID
Abstract—Ultrawide bandwidth (UWB) technology is a promising solution for next generation radiofrequency identification (RFID) systems to overcome most of the main limitations o...
Davide Dardari, Raffaele D'Errico
IPPS
1996
IEEE
15 years 6 months ago
Partitionability of the Multistage Interconnection Networks
- Partitionability allows the creation of many physically independent subsystems, each of which retains an identical functionality as its parent network and has no communication in...
Yeimkuan Chang
COCOA
2008
Springer
15 years 3 months ago
Stochastic Online Scheduling Revisited
We consider the problem of minimizing the total weighted completion time on identical parallel machines when jobs have stochastic processing times and may arrive over time. We give...
Andreas S. Schulz