Sciweavers

21984 search results - page 4302 / 4397
» C
Sort
View
TIFS
2010
186views more  TIFS 2010»
13 years 8 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIP
2010
138views more  TIP 2010»
13 years 8 months ago
Motion Tuned Spatio-Temporal Quality Assessment of Natural Videos
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
Kalpana Seshadrinathan, Alan C. Bovik
TIP
2010
153views more  TIP 2010»
13 years 8 months ago
A Versatile Model for Packet Loss Visibility and its Application to Packet Prioritization
In this paper, we propose a generalized linear model for video packet loss visibility that is applicable to different group-of-picture structures. We develop the model using three...
Ting-Lan Lin, Sandeep Kanumuri, Yuan Zhi, David Po...
TKDE
2010
189views more  TKDE 2010»
13 years 8 months ago
Projective Distribution of XQuery with Updates
—We investigate techniques to automatically decompose any XQuery query—including updating queries specified by the XQuery Update Facility (XQUF)—into subqueries, that can be ...
Ying Zhang, Nan Tang, Peter A. Boncz
TMC
2010
179views more  TMC 2010»
13 years 8 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
« Prev « First page 4302 / 4397 Last » Next »