Sciweavers

404 search results - page 66 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
PEWASUN
2005
ACM
15 years 9 months ago
Impact of multipath fading in wireless ad hoc networks
This paper examines several MANET behaviors and suggests root causes using a stochastic model of received power. It focuses specifically on MANET mechanisms most impacted by fin...
John Mullen, Hong Huang
122
Voted
WCE
2008
15 years 4 months ago
IEEE 802.11E Block Acknowledgement Policies
Optimisation of IEEE 802.11e MAC protocol performance can be performed by modifying several parameters left open in the standard, like buffer size and acknowledgement policies. In ...
Orlando Cabral, Alberto Segarra, Fernando J. Velez
INTERSPEECH
2010
14 years 10 months ago
Approaching human listener accuracy with modern speaker verification
Being able to recognize people from their voice is a natural ability that we take for granted. Recent advances have shown significant improvement in automatic speaker recognition ...
Ville Hautamäki, Tomi Kinnunen, Mohaddeseh No...
132
Voted
IJNSEC
2010
163views more  IJNSEC 2010»
14 years 10 months ago
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
As the importance and the value of exchanged data over the Internet or other media types are increasing, the search for the best solution to offer the necessary protection against...
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, M...
SIGCOMM
2009
ACM
15 years 10 months ago
Optimizing the BSD routing system for parallel processing
The routing architecture of the original 4.4BSD [3] kernel has been deployed successfully without major design modification for over 15 years. In the unified routing architectur...
Qing Li, Kip Macy