Sciweavers

1628 search results - page 279 / 326
» Compiler Construction Using Scheme
Sort
View
TDSC
2008
99views more  TDSC 2008»
13 years 10 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
TMI
2008
123views more  TMI 2008»
13 years 10 months ago
ORBIT: A Multiresolution Framework for Deformable Registration of Brain Tumor Images
Abstract--A deformable registration method is proposed for registering a normal brain atlas with images of brain tumor patients. The registration is facilitated by first simulating...
Evangelia I. Zacharaki, Dinggang Shen, Seung-koo L...
TMM
2002
81views more  TMM 2002»
13 years 9 months ago
Staggered push - a linearly scalable architecture for push-based parallel video servers
With the rapid performance improvements in low-cost PCs, it becomes increasingly practical and cost-effective to implement large-scale video-on-demand (VoD) systems around parallel...
Jack Y. B. Lee
ICIP
2009
IEEE
13 years 7 months ago
Finger-knuckle-print: A new biometric identifier
This paper presents a new biometric identifier, namely finger-knuckle-print (FKP), for personal identity authentication. First a specific data acquisition device is constructed to...
Lin Zhang, Lei Zhang 0006, David Zhang
TPDS
2010
126views more  TPDS 2010»
13 years 4 months ago
Stabilizing Distributed R-Trees for Peer-to-Peer Content Routing
Publish/subscribe systems provide useful platforms for delivering data (events) from publishers to subscribers in a decoupled fashion. Developing efficient publish/subscribe scheme...
Silvia Bianchi, Pascal Felber, Maria Gradinariu Po...