• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 10,224
Next 10 →

Providing robust and ubiquitous security support for mobile ad-hoc networks

by Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang - IN ICNP, 2001 , 2001
"... Providing security support for mobile ad-hoc networks is challenging for several reasons: (a) wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional break-ins by adversaries may be inevitable in a large time window; (b) mobile users demand “ ..."
Abstract - Cited by 320 (8 self) - Add to MetaCart
authority functions through a threshold secret sharing mechanism, in which each entity holds a secret share and multiple entities in a local neighborhood jointly provide complete services. We employ localized certification schemes to enable ubiquitous services. We also update the secret shares to further

Gabor Feature Based Classification Using the Enhanced Fisher Linear Discriminant Model for Face Recognition

by Chengjun Liu, Harry Wechsler - IEEE Trans. Image Processing , 2002
"... This paper introduces a novel Gabor-Fisher Classifier (GFC) for face recognition. The GFC method, which is robust to changes in illumination and facial expression, applies the Enhanced Fisher linear discriminant Model (EFM) to an augmented Gabor feature vector derived from the Gabor wavelet represen ..."
Abstract - Cited by 286 (10 self) - Add to MetaCart
This paper introduces a novel Gabor-Fisher Classifier (GFC) for face recognition. The GFC method, which is robust to changes in illumination and facial expression, applies the Enhanced Fisher linear discriminant Model (EFM) to an augmented Gabor feature vector derived from the Gabor wavelet

On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming

by Taesang Yoo, Andrea Goldsmith - IEEE J. SELECT. AREAS COMMUN , 2006
"... Although the capacity of multiple-input/multiple-output (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practical systems. This paper investigates if, for a large number of users, simpler schemes can achieve the same performance. Specifica ..."
Abstract - Cited by 308 (4 self) - Add to MetaCart
ZFBF. These users are semiorthogonal to one another and can be grouped for simultaneous transmission to enhance the throughput of scheduling algorithms. Based on the user grouping, we propose and compare two fair scheduling schemes in round-robin ZFBF and proportional-fair ZFBF. We provide numerical

Face recognition with local binary patterns

by Timo Ahonen, Abdenour Hadid, Matti Pietikäinen - In Proc. of 9th Euro15 We
"... Abstract. In this work, we present a novel approach to face recognition which considers both shape and texture information to represent face images. The face area is first divided into small regions from which Local Binary Pattern (LBP) histograms are extracted and concatenated into a single, spatia ..."
Abstract - Cited by 302 (15 self) - Add to MetaCart
, spatially enhanced feature histogram efficiently representing the face image. The recognition is performed using a nearest neighbour classifier in the computed feature space with Chi square as a dissimilarity measure. Extensive experiments clearly show the superiority of the proposed scheme over all

Reliability Issues for High Performance anoscale CMOS Technologies with Channel Mobility Enhancing Schemes

by Steve S. Chung
"... Abstract- In this talk, an overview of the mobility enhancing techniques for high performance/low power CMOS technologies will be introduced first. Two categories for mobility enhancing schemes, channel induced strain using Si/SiGe, and hybrid-substrate engineering, with (100) and (110) orienta ..."
Abstract - Add to MetaCart
Abstract- In this talk, an overview of the mobility enhancing techniques for high performance/low power CMOS technologies will be introduced first. Two categories for mobility enhancing schemes, channel induced strain using Si/SiGe, and hybrid-substrate engineering, with (100) and (110

LimitLESS Directories: A Scalable Cache Coherence Scheme

by David Chaiken , John Kubiatowicz, Anant Agarwal , 1991
"... Caches enhance the performance of multiprocessors by reducing network tra#c and average memory access latency. However, cache-based systems must address the problem of cache coherence. We propose the LimitLESS directory protocol to solve this problem. The LimitLESS scheme uses a combination of hardw ..."
Abstract - Cited by 224 (29 self) - Add to MetaCart
Caches enhance the performance of multiprocessors by reducing network tra#c and average memory access latency. However, cache-based systems must address the problem of cache coherence. We propose the LimitLESS directory protocol to solve this problem. The LimitLESS scheme uses a combination

Optimal Asymmetric Encryption – How to Encrypt with RSA

by Mihir Bellare, Phillip Rogaway , 1995
"... Given an arbitrary k-bit to k-bit trapdoor permutation f and a hash function, we exhibit an encryption scheme for which (i) any string x of length slightly less than k bits can be encrypted as f(rx), where rx is a simple probabilistic encoding of x depending on the hash function; and (ii) the scheme ..."
Abstract - Cited by 224 (21 self) - Add to MetaCart
) the scheme can be proven semantically secure assuming the hash function is \ideal. " Moreover, a slightly enhanced scheme is shown to have the property that the adversary can create ciphertexts only of strings for which she \knows " the corresponding plaintexts|such ascheme is not only

Fairness Enhancement Scheme for Multimedia Applications in IEEE 802.11e Wireless LANs

by Young-woo Nam, Sunmyeng Kim, Si-gwan Kim
"... Abstract—Multimedia traffic should be transmitted to a receiver within the delay bound. The traffic is discarded when breaking its delay bound. Then, QoS (Quality of Service) of the traffic and network performance are lowered. The IEEE 802.11e standard defines a TXOP (Transmission Opportunity) param ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
to alleviate the fairness problem, we propose a dynamic TXOP control scheme based on the channel utilization of network and multimedia traffic quantity in the queue of a station. The simulation results show that the proposed scheme improves fairness and QoS of multimedia traffic. Keywords- fairness; multimedia

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs

by Christoph Krauß, Markus Schneider, Claudia Eckert, Technische Universität Darmstadt
"... Abstract — Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wireless sensor networks to mitigate the impact of node compromise. A report for the base station, generated by one ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract — Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wireless sensor networks to mitigate the impact of node compromise. A report for the base station, generated by one

Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis And Enhancement

by Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, Jian Ma , 2002
"... EEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the IEEE 802.11 WLAN MAC protocol is Distributed Coordination Function(DCF), which is a Carrier Sense Multiple Access with Col ..."
Abstract - Cited by 226 (3 self) - Add to MetaCart
with Collision Avoidance(CSMA/CA) with binary slotted exponential back-off scheme. Since IEEE 802.11 MAC has its own characteristics that are different from other wireless MAC protocols, the performance of reliable transport protocol over 802.11 needs further study.
Next 10 →
Results 21 - 30 of 10,224
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University