Results 21 - 30
of
10,224
Providing robust and ubiquitous security support for mobile ad-hoc networks
- IN ICNP, 2001
, 2001
"... Providing security support for mobile ad-hoc networks is challenging for several reasons: (a) wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional break-ins by adversaries may be inevitable in a large time window; (b) mobile users demand “ ..."
Abstract
-
Cited by 320 (8 self)
- Add to MetaCart
authority functions through a threshold secret sharing mechanism, in which each entity holds a secret share and multiple entities in a local neighborhood jointly provide complete services. We employ localized certification schemes to enable ubiquitous services. We also update the secret shares to further
Gabor Feature Based Classification Using the Enhanced Fisher Linear Discriminant Model for Face Recognition
- IEEE Trans. Image Processing
, 2002
"... This paper introduces a novel Gabor-Fisher Classifier (GFC) for face recognition. The GFC method, which is robust to changes in illumination and facial expression, applies the Enhanced Fisher linear discriminant Model (EFM) to an augmented Gabor feature vector derived from the Gabor wavelet represen ..."
Abstract
-
Cited by 286 (10 self)
- Add to MetaCart
This paper introduces a novel Gabor-Fisher Classifier (GFC) for face recognition. The GFC method, which is robust to changes in illumination and facial expression, applies the Enhanced Fisher linear discriminant Model (EFM) to an augmented Gabor feature vector derived from the Gabor wavelet
On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming
- IEEE J. SELECT. AREAS COMMUN
, 2006
"... Although the capacity of multiple-input/multiple-output (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practical systems. This paper investigates if, for a large number of users, simpler schemes can achieve the same performance. Specifica ..."
Abstract
-
Cited by 308 (4 self)
- Add to MetaCart
ZFBF. These users are semiorthogonal to one another and can be grouped for simultaneous transmission to enhance the throughput of scheduling algorithms. Based on the user grouping, we propose and compare two fair scheduling schemes in round-robin ZFBF and proportional-fair ZFBF. We provide numerical
Face recognition with local binary patterns
- In Proc. of 9th Euro15 We
"... Abstract. In this work, we present a novel approach to face recognition which considers both shape and texture information to represent face images. The face area is first divided into small regions from which Local Binary Pattern (LBP) histograms are extracted and concatenated into a single, spatia ..."
Abstract
-
Cited by 302 (15 self)
- Add to MetaCart
, spatially enhanced feature histogram efficiently representing the face image. The recognition is performed using a nearest neighbour classifier in the computed feature space with Chi square as a dissimilarity measure. Extensive experiments clearly show the superiority of the proposed scheme over all
Reliability Issues for High Performance anoscale CMOS Technologies with Channel Mobility Enhancing Schemes
"... Abstract- In this talk, an overview of the mobility enhancing techniques for high performance/low power CMOS technologies will be introduced first. Two categories for mobility enhancing schemes, channel induced strain using Si/SiGe, and hybrid-substrate engineering, with (100) and (110) orienta ..."
Abstract
- Add to MetaCart
Abstract- In this talk, an overview of the mobility enhancing techniques for high performance/low power CMOS technologies will be introduced first. Two categories for mobility enhancing schemes, channel induced strain using Si/SiGe, and hybrid-substrate engineering, with (100) and (110
LimitLESS Directories: A Scalable Cache Coherence Scheme
, 1991
"... Caches enhance the performance of multiprocessors by reducing network tra#c and average memory access latency. However, cache-based systems must address the problem of cache coherence. We propose the LimitLESS directory protocol to solve this problem. The LimitLESS scheme uses a combination of hardw ..."
Abstract
-
Cited by 224 (29 self)
- Add to MetaCart
Caches enhance the performance of multiprocessors by reducing network tra#c and average memory access latency. However, cache-based systems must address the problem of cache coherence. We propose the LimitLESS directory protocol to solve this problem. The LimitLESS scheme uses a combination
Optimal Asymmetric Encryption – How to Encrypt with RSA
, 1995
"... Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encryption scheme for which (i) any string x of length slightly less than k bits can be encrypted as f(rx), where rx is a simple probabilistic encoding of x depending on the hash function; and (ii) the scheme ..."
Abstract
-
Cited by 224 (21 self)
- Add to MetaCart
) the scheme can be proven semantically secure assuming the hash function is \ideal. " Moreover, a slightly enhanced scheme is shown to have the property that the adversary can create ciphertexts only of strings for which she \knows " the corresponding plaintexts|such ascheme is not only
Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs
"... Abstract—Multimedia traffic should be transmitted to a receiver within the delay bound. The traffic is discarded when breaking its delay bound. Then, QoS (Quality of Service) of the traffic and network performance are lowered. The IEEE 802.11e standard defines a TXOP (Transmission Opportunity) param ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
to alleviate the fairness problem, we propose a dynamic TXOP control scheme based on the channel utilization of network and multimedia traffic quantity in the queue of a station. The simulation results show that the proposed scheme improves fairness and QoS of multimedia traffic. Keywords- fairness; multimedia
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
"... Abstract — Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wireless sensor networks to mitigate the impact of node compromise. A report for the base station, generated by one ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract — Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wireless sensor networks to mitigate the impact of node compromise. A report for the base station, generated by one
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis And Enhancement
, 2002
"... EEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is Distributed Coordination Function(DCF), which is a Carrier Sense Multiple Access with Col ..."
Abstract
-
Cited by 226 (3 self)
- Add to MetaCart
with Collision Avoidance(CSMA/CA) with binary slotted exponential back-off scheme. Since IEEE 802.11 MAC has its own characteristics that are different from other wireless MAC protocols, the performance of reliable transport protocol over 802.11 needs further study.
Results 21 - 30
of
10,224