Sciweavers

4761 search results - page 660 / 953
» Performance of Protocols
Sort
View
ICB
2009
Springer
226views Biometrics» more  ICB 2009»
15 years 2 months ago
Fingerprint and On-Line Signature Verification Competitions at ICB 2009
This paper describes the objectives, the tasks proposed to the participants and the associated protocols in terms of database and assessment tools of two present competitions on fi...
Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferr...
CORR
2010
Springer
61views Education» more  CORR 2010»
14 years 11 months ago
Spatial fairness in linear wireless multi-access networks
Multi-access networks may exhibit severe unfairness in throughput, in the sense that some nodes receive structurally higher throughput than others. Recent studies show that this u...
Peter M. van de Ven, J. S. H. van Leeuwaarden, Dee...
TON
2010
87views more  TON 2010»
14 years 11 months ago
Measuring Transmission Opportunities in 802.11 Links
Abstract-- We propose a powerful MAC/PHY cross-layer approach to measuring 802.11 transmission opportunities in WLAN networks on a per-link basis. Our estimator can operate at a si...
Domenico Giustiniano, David Malone, Douglas J. Lei...
196
Voted
CLUSTER
2011
IEEE
14 years 4 months ago
Investigating Scenario-Conscious Asynchronous Rendezvous over RDMA
— In this paper, we propose a light-weight asynchronous message progression mechanism for large message transfers in Message Passing Interface (MPI) Rendezvous protocol that is s...
Judicael A. Zounmevo, Ahmad Afsahi
IACR
2011
192views more  IACR 2011»
14 years 4 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...