• Citations Per Year
Learn More
In this paper retransmission strategies for real-time services over IEEE 802.16 networks are investigated. This is done in the context of VoIP using unsolicited grant service (UGS) scheduling. A mathematical model is derived for the case where the downlink channel remains constant automatic repeat request (ARQ) is analyzed in terms of bandwidth usage on the(More)
In PKC 2014, Langlois et al. proposed the first lattice-based group signature scheme with the verifier-local revocability. The security of their scheme is selfless anonymity, which is weaker than the security model defined by Bellare, Micciancio and Warinschi (EUROCRYPT 2003). By using the technique in the group signature scheme proposed by Ling et al. (PKC(More)
This paper presents results of a study carried out to count and classify vehicles in video sequences of traffic scenes captured from a fixed digital camera under night conditions. The vehicle identification has been carried out using the headlights, which may be the only key feature available to identify vehicles under low light conditions through visible(More)
IEEE 802.16 is a wireless metropolitan area broadband access technology which provides layer two service differentiation for many types of traffic flows. In this paper the transport of uplink best effort traffic from the subscriber to the base station is considered. The performance of best effort service class is analyzed and compared with non-real-time(More)
  • 1