Sciweavers

3735 search results - page 728 / 747
» Order compression schemes
Sort
View
BROADNETS
2004
IEEE
15 years 4 months ago
Random Asynchronous Wakeup Protocol for Sensor Networks
This paper presents Random Asynchronous Wakeup (RAW), a power saving technique for sensor networks that reduces energy consumption without significantly affecting the latency or c...
Vamsi Paruchuri, Shivakumar Basavaraju, Arjan Durr...
CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
15 years 4 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
102
Voted
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 4 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine
CGI
1997
IEEE
15 years 4 months ago
An Algorithm for Polygon Subdivision Based on Vertex Normals
In order to achieve the impression of a smooth surface while rendering a polygon mesh, normal vector vectors may be provided in the vertices of the mesh that are the average of th...
Cornelius W. A. M. van Overveld, Brian Wyvill
EUROCRYPT
1995
Springer
15 years 4 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail