Sciweavers

404 search results - page 71 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
VTC
2006
IEEE
152views Communications» more  VTC 2006»
15 years 3 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
EXPDB
2006
ACM
15 years 3 months ago
A Reproducible Benchmark for P2P Retrieval
With the growing popularity of information retrieval (IR) in distributed systems and in particular P2P Web search, a huge number of protocols and prototypes have been introduced i...
Thomas Neumann, Matthias Bender, Sebastian Michel,...
77
Voted
AINA
2009
IEEE
14 years 12 months ago
Benchmarking Latency Effects on Mobility Tracking in WSNs
The number of active nodes in a WSN deployment governs both the longevity of the network and the accuracy of applications using the network's data. As node hibernation techni...
Richard Tynan, Michael J. O'Grady, Gregory M. P. O...
81
Voted
ICASSP
2010
IEEE
14 years 9 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
ICIP
2006
IEEE
15 years 11 months ago
Phase Distortion Correction for See-Through-The-Wall Imaging Radar
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
Jay A. Marble, Alfred O. Hero