نتایج جستجو برای: hybrid scheme
تعداد نتایج: 405104 فیلتر نتایج به سال:
A novel routing scheme is proposed for virtual cutthrough routing that attempts to combine the low routing delay of deterministic routing with the exibility and low queuing delays of adaptive routing. This hybrid routing mechanism relies on a pipelined implementation where di erent paths and stages of the router are used for di erent routing modes. A simulation based experimental evaluation of ...
A hybrid adaptive subtraction scheme is proposed. This hybrid scheme uses predictionerror filters as covariance operators within the filter-estimation step. This methods proves to be the most efficient when the noise and signal interfere. Although prediction-error filters are utilized, this technique is not a pattern-recognition technique: it simply tries to remove the correlated signal informa...
A Novel ATM Traffic Scheduler for Real-Time Multimedia Data Transport with Improved Packet Level QoS
In this paper, we propose an efficient scheduling scheme called Multi-layer Gated Frame Queueing (MGFQ) for real-time traffics over ATM networks. ATM switches equipped with function of MGFQ which employs only one set of FIFO queues can provide real-time multimedia communication with a wide range of QoS requirements. In addition, a hybrid design which combines MGFQ scheme with Age Priority Packe...
A combination of a hybrid interference cancellation (IC) scheme and decision directed channel estimation is proposed for the uplink of multirate direct-sequence code division multiple access (DS/CDMA) systems communicating over mobile radio channels. The hybrid IC scheme includes both non-decision directed and decision directed IC, joined together with a modified RAKE combiner for utilization o...
This paper expands the notion of a KEM–DEM hybrid encryption scheme to the signcryption setting by introducing the notion of a signcryption KEM, a signcryption DEM and a hybrid signcryption scheme. We present the security criteria that a signcryption KEM and DEM must satisfy in order that the overall signcryption scheme is secure against outsider attacks. We also present ECISS–KEM — a simple, e...
The character of Parallel Concatenated LDPC codes with rate-compatible is analyzed. An Incremental redundancy hybrid ARQ scheme based on parallel concatenated LDPC codes is introduced. We studied the throughput of the new HARQ scheme and obtained the closed_form solutions. Furthermore, the throughput of the new HARQ scheme is simulated. It shows that for arbitrary block fading channel, comprisi...
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to opt...
In this paper we examine the notion of plaintext awareness as it applies to hybrid encryption schemes. We apply this theory to the Cramer-Shoup hybrid scheme acting on fixed length messages and deduce that the Cramer-Shoup scheme is plaintext-aware in the standard model. This answers a previously open conjecture of Bellare and Palacio on the existence of fully plaintext-aware encryption schemes.
This paper studies resource reservation mechanisms that can be incorporated into distributed multi{path Quality{of{Service (QoS) routing algorithms. Three resource reservation schemes, the forward reservation scheme, the backward reservation scheme and the hybrid reservation scheme, are investigated. Protocols that combine these resource reservation schemes with a ticket{based distributed QoS r...
EPOC-2 is an asymmetric (public-key) hybrid encryption scheme based on the asymmetric cryptosystem of Okamoto and Uchiyama, [13], and the hybrid encryption scheme of Fujisaki and Okamoto, [5]. In simple terms it generates a random key for use with a symmetric cipher and enciphers the message using that symmetric cipher. It then enciphers the key, along with a check value, using the Okamoto-Uchi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید