Sciweavers

799 search results - page 58 / 160
» Improving the feasibility pump
Sort
View
ICCCN
2007
IEEE
15 years 5 months ago
Multi-channel Jamming Attacks using Cognitive Radios
To improve spectrum efficiency, future wireless devices will use cognitive radios to dynamically access spectrum. While offering great flexibility and softwarereconfigurability...
Ashwin Sampath, Hui Dai, Haitao Zheng, Ben Y. Zhao
ICIP
2007
IEEE
15 years 5 months ago
Using Dempster-Shafer Theory to Fuse Multiple Information Sources in Region-Based Segmentation
This paper presents a new method for segmentation of images into large regions that reflect the real world objects present in a scene. It explores the feasibility of utilizing sp...
Tomasz Adamek, Noel E. O'Connor
96
Voted
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
15 years 5 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
90
Voted
ICA3PP
2007
Springer
15 years 5 months ago
RSM-Based Gossip on P2P Network
Classification is a kind of basic semantics that people often use to manage versatile contents in daily life. Resource Space Model (RSM) is a semantic model for sharing and managin...
Hai Zhuge, Xiang Li
TGC
2007
Springer
15 years 5 months ago
Relational Analysis for Delivery of Services
Many techniques exist for statically computing properties of the evolution of processes expressed in process algebras. Static analysis has shown how to obtain useful results that c...
Flemming Nielson, Hanne Riis Nielson, Jörg Ba...