Sciweavers

3735 search results - page 548 / 747
» Order compression schemes
Sort
View
IJSN
2007
94views more  IJSN 2007»
15 years 5 months ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
TC
2008
15 years 5 months ago
A Dynamic Slack Management Technique for Real-Time Distributed Embedded Systems
This work presents a novel slack management technique, the Service-Rate-Proportionate (SRP) Slack Distribution, for real-time distributed embedded systems to reduce energy consumpt...
Subrata Acharya, Rabi N. Mahapatra
TSP
2008
74views more  TSP 2008»
15 years 5 months ago
Performance of ESPRIT for Estimating Mixtures of Complex Exponentials Modulated by Polynomials
High Resolution (HR) methods are known to provide accurate frequency estimates for discrete spectra. The Polynomial Amplitude Complex Exponentials (PACE) model, also called quasipo...
Roland Badeau, Gaël Richard, Bertrand David
ADCM
2004
73views more  ADCM 2004»
15 years 5 months ago
Polynomial Reproduction in Subdivision
Abstract. We study conditions on the matrix mask of a vector subdivision scheme ensuring that certain polynomial input vectors yield polynomial output again. The conditions are in ...
Kurt Jetter, G. Zimmermann
JSAC
2007
101views more  JSAC 2007»
15 years 5 months ago
Adaptive energy conserving algorithms for neighbor discovery in opportunistic Bluetooth networks
— In this paper, we introduce and evaluate novel adaptive schemes for neighbor discovery in Bluetooth-enabled ad-hoc networks. In an ad-hoc peer-to-peer setting, neighbor search ...
Catalin Drula, Cristiana Amza, Franck Rousseau, An...