Sciweavers

4781 search results - page 902 / 957
» Online algorithms for network design
Sort
View
ICUIMC
2009
ACM
15 years 8 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
IMC
2009
ACM
15 years 8 months ago
Practical beamforming based on RSSI measurements using off-the-shelf wireless clients
WLANs have become an important last-mile technology for providing internet access within homes and enterprises. In such indoor deployments, the wireless channel suffers from signi...
Sriram Lakshmanan, Karthikeyan Sundaresan, Sampath...
PETRA
2009
ACM
15 years 8 months ago
Towards a social fabric for pervasive assistive environments
The digital divide refers to a lack of technological access, part of which involves exclusion from a blooming arena of social interaction. People without mobile phones or PCs cann...
Clare Owens, David E. Millard, Andrew Stanford-Cla...
CISS
2008
IEEE
15 years 7 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
GLOBECOM
2008
IEEE
15 years 7 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...