Sciweavers

404 search results - page 41 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
15 years 9 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
157
Voted
ICN
2005
Springer
15 years 9 months ago
Load Distribution Performance of the Reliable Server Pooling Framework
Abstract. The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by prov...
Thomas Dreibholz, Erwin P. Rathgeb, Michael Tü...
126
Voted
NSDI
2007
15 years 5 months ago
WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks
WiFi-based Long Distance (WiLD) networks with links as long as 50–100 km have the potential to provide connectivity at substantially lower costs than traditional approaches. How...
Rabin K. Patra, Sergiu Nedevschi, Sonesh Surana, A...
AINA
2009
IEEE
15 years 10 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura
SIGMOBILE
2010
147views more  SIGMOBILE 2010»
14 years 10 months ago
TCPSpeaker: clean and dirty sides of the same slate
As new approaches toward clean-slate network transport continue to emerge in the wireless domain and beyond, so grows the difficulty of conducting reproducible, head-to-head evalu...
Dan Levin, Harald Schiöberg, Ruben Merz, Cigd...