Sciweavers

819 search results - page 96 / 164
» User-controlled link adaptation
Sort
View
ASIACRYPT
2001
Springer
15 years 2 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
ICC
2000
IEEE
188views Communications» more  ICC 2000»
15 years 2 months ago
Route-Lifetime Assessment Based Routing (RABR) Protocol for Mobile Ad-Hoc Networks
—Owing to the absence of any static support structure, Ad-hoc networks are prone to link failures. The ‘shortest path seeking’ routing protocols may not lead to stable routes...
Sulabh Agarwal, Ashish Ahuja, Jatinder Pal Singh, ...
PG
2000
IEEE
15 years 2 months ago
Acceleration of Monte Carlo Path Tracing in General Environments
This paper describes a two pass algorithm capable of computing solutions to the global illumination in general environments (diffuse or glossy surfaces, anisotropically scattering...
Frederic Pérez, Ignacio Martín, Xavi...
ACMDIS
2000
ACM
15 years 2 months ago
Touch Me, Hit Me and I Know How You Feel: A Design Approach to Emotionally Rich Interaction
In this paper we propose a 3-step method for designing emotionally rich interactions, illustrated by the design of an alarm clock. By emotionally rich interaction we understand in...
Stephan Wensveen, Kees Overbeeke, J. P. Djajadinin...
INFOCOM
1999
IEEE
15 years 2 months ago
CEDAR: a Core-Extraction Distributed Ad Hoc Routing Algorithm
Abstract--CEDAR is an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and maintenance of a self-organizing routing infr...
Prasun Sinha, Raghupathy Sivakumar, Vaduvur Bhargh...