A protocol is given to take an ElGamal ciphertext encrypted under the key of one distributed service and produce the corresponding ciphertext encrypted under the key of another di...
Lidong Zhou, Michael A. Marsh, Fred B. Schneider, ...
Abstract—Cooperative diversity is a useful technique to increase reliability and throughput of wireless networks. To analyze the performance gain from cooperative diversity, outa...
Kampol Woradit, Tony Q. S. Quek, Watcharapan Suwan...
Fuzzy rule based image segmentation techniques tend in general, to be application dependent with the structure of the membership functions being predefined and in certain cases, t...
—We derive an adaptive power control method for a collaborative network utilizing partner selection that aims to minimize the frame error rate (FER). We model a decodeand-forward...
Weisi Guo, Ioannis Chatzigeorgiou, Ian J. Wassell,...
Objective: This study investigates the use of automated pattern recognition methods on magnetic resonance data with the ultimate goal to assist clinicians in the diagnosis of brai...
Jan Luts, Arend Heerschap, Johan A. K. Suykens, Sa...