Sciweavers

5687 search results - page 99 / 1138
» Visualizing Evaluation in Scheme
Sort
View
GLOBECOM
2010
IEEE
14 years 8 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen
EUC
2005
Springer
15 years 3 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
ICC
2007
IEEE
138views Communications» more  ICC 2007»
15 years 4 months ago
An Analytical Model for Energy Efficiency of Error Control Schemes in Sensor Networks
- This paper analyzes the energy efficiency of wireless sensor networks using different error control schemes. An analytical model is presented to evaluate the energy efficiency in...
João H. Kleinschmidt, Walter C. Borelli, Ma...
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
15 years 3 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
ICASSP
2011
IEEE
14 years 1 months ago
Support vector regression fusion scheme in phone duration modeling
A fusion scheme of phone duration models (PDMs) is presented in this work. Specifically, a support vector regression (SVR)-fusion model is fed with the predictions of a group of i...
Alexandros Lazaridis, Iosif Mporas, Todor Ganchev,...