Sciweavers

341 search results - page 7 / 69
» The way forward
Sort
View
ICISC
2003
108views Cryptology» more  ICISC 2003»
14 years 11 months ago
On the Security of a Group Signature Scheme with Forward Security
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable way. In case of a dispute, however, a design...
Guilin Wang
INFOCOM
2012
IEEE
13 years 2 days ago
Transparent acceleration of software packet forwarding using netmap
—Software packet forwarding has been used for a long time in general purpose operating systems. While interesting for prototyping or on slow links, it is not considered a viable ...
Luigi Rizzo, Marta Carbone, Gaetano Catalli
GLOBECOM
2009
IEEE
15 years 4 months ago
Joint Power and Channel Resource Allocation for F/TDMA Decode and Forward Relay Networks
—In this paper, we study the joint power and channel resource allocation problem for a multiuser F/TDMA decodeand-forward (DF) relay network under per-node power constraints and ...
Yin Sun, Yuanzhang Xiao, Ming Zhao 0001, Xiaofeng ...
69
Voted
PKDD
2009
Springer
102views Data Mining» more  PKDD 2009»
15 years 4 months ago
A Generalization of Forward-Backward Algorithm
Structured prediction has become very important in recent years. A simple but notable class of structured prediction is one for sequences, so-called sequential labeling. For sequen...
Ai Azuma, Yuji Matsumoto
VTC
2007
IEEE
15 years 3 months ago
Coverage Analysis for Cellular Systems with Multiple Antennas Using Decode-and-Forward Relays
— Placing relays around the base station (BS) to assist wireless communication is an effective way of extending coverage in cellular systems. This paper provides a quantitative a...
Jian Zhao, Ingmar Hammerström, Marc Kuhn, Arm...