Sciweavers

5752 search results - page 216 / 1151
» Informative Labeling Schemes
Sort
View
IJNSEC
2007
164views more  IJNSEC 2007»
15 years 3 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
134
Voted
AAMAS
2002
Springer
15 years 3 months ago
A Scheduling Scheme for Controlling Allocation of CPU Resources for Mobile Programs
There is considerable interest in developing runtime infrastructures for programs that can migrate from one host to another. Mobile programs are appealing because they support eff...
Manoj Lal, Raju Pandey
145
Voted
JNSM
2000
96views more  JNSM 2000»
15 years 3 months ago
Multi-service Dynamic QoS Routing Schemes with Call Admission Control: A Comparative Study
In this paper, we consider wide-area backbone networks where multiple connection-oriented guaranteed services with differing bandwidth/flow requirements are offered. Specifically,...
Deep Medhi, I. Sukiman
164
Voted
PIMRC
2010
IEEE
15 years 1 months ago
A multi-threshold scheme for feedback load reduction in multiuser MIMO broadcast channel
In a multiuser system, independent time-varying channels among different users can be exploited to provide multiuser diversity (MUD) gain and increase the system throughput. For th...
Jin-Hao Li, Hsuan-Jung Su, Yu-Lun Tsai
147
Voted
IJISEC
2010
150views more  IJISEC 2010»
15 years 28 days ago
Efficient online/offline identity-based signature for wireless sensor network
In this paper, we present an online/offline identity-based signature scheme for the wireless sensor network (WSN). We argue that due to significant reduction in costs of computati...
Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanji...