نتایج جستجو برای: hybrid scheme

تعداد نتایج: 405104  

1997
Dianne Miller Walid A. Najjar

A novel routing scheme is proposed for virtual cutthrough routing that attempts to combine the low routing delay of deterministic routing with the exibility and low queuing delays of adaptive routing. This hybrid routing mechanism relies on a pipelined implementation where di erent paths and stages of the router are used for di erent routing modes. A simulation based experimental evaluation of ...

2002
Antoine Guitton

A hybrid adaptive subtraction scheme is proposed. This hybrid scheme uses predictionerror filters as covariance operators within the filter-estimation step. This methods proves to be the most efficient when the noise and signal interfere. Although prediction-error filters are utilized, this technique is not a pattern-recognition technique: it simply tries to remove the correlated signal informa...

2000
Fu-Ming Tsou Hong-Bin Chiou Zsehong Tsai

In this paper, we propose an efficient scheduling scheme called Multi-layer Gated Frame Queueing (MGFQ) for real-time traffics over ATM networks. ATM switches equipped with function of MGFQ which employs only one set of FIFO queues can provide real-time multimedia communication with a wide range of QoS requirements. In addition, a hybrid design which combines MGFQ scheme with Age Priority Packe...

1996
Ann-Louise Johansson Arne Svensson

A combination of a hybrid interference cancellation (IC) scheme and decision directed channel estimation is proposed for the uplink of multirate direct-sequence code division multiple access (DS/CDMA) systems communicating over mobile radio channels. The hybrid IC scheme includes both non-decision directed and decision directed IC, joined together with a modified RAKE combiner for utilization o...

2005
Alexander W. Dent

This paper expands the notion of a KEM–DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS–KEM — a simple, e...

2006
Hong Wen Chusheng Fu Zhiping Shi

The character of Parallel Concatenated LDPC codes with rate-compatible is analyzed. An Incremental redundancy hybrid ARQ scheme based on parallel concatenated LDPC codes is introduced. We studied the throughput of the new HARQ scheme and obtained the closed_form solutions. Furthermore, the throughput of the new HARQ scheme is simulated. It shows that for arbitrary block fading channel, comprisi...

2016
Guomei Zhang Hao Sun

We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to opt...

2005
Alexander W. Dent

In this paper we examine the notion of plaintext awareness as it applies to hybrid encryption schemes. We apply this theory to the Cramer-Shoup hybrid scheme acting on fixed length messages and deduce that the Cramer-Shoup scheme is plaintext-aware in the standard model. This answers a previously open conjecture of Bellare and Palacio on the existence of fully plaintext-aware encryption schemes.

2000
Xin Yuan Hui Ding Yuan Zhong Jie Zhang

This paper studies resource reservation mechanisms that can be incorporated into distributed multi{path Quality{of{Service (QoS) routing algorithms. Three resource reservation schemes, the forward reservation scheme, the backward reservation scheme and the hybrid reservation scheme, are investigated. Protocols that combine these resource reservation schemes with a ticket{based distributed QoS r...

2002
Alexander W. Dent

EPOC-2 is an asymmetric (public-key) hybrid encryption scheme based on the asymmetric cryptosystem of Okamoto and Uchiyama, [13], and the hybrid encryption scheme of Fujisaki and Okamoto, [5]. In simple terms it generates a random key for use with a symmetric cipher and enciphers the message using that symmetric cipher. It then enciphers the key, along with a check value, using the Okamoto-Uchi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید