Sciweavers

849 search results - page 117 / 170
» Completely Non-malleable Schemes
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
CN
2007
168views more  CN 2007»
13 years 9 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
CAGD
2005
113views more  CAGD 2005»
13 years 9 months ago
Mesh scissoring with minima rule and part salience
This paper presents an intelligent scissoring operator for meshes. Unlike common approaches that segment a mesh using clustering schemes, we introduce a method that concentrates o...
Yunjin Lee, Seungyong Lee, Ariel Shamir, Daniel Co...
ECCV
2004
Springer
14 years 11 months ago
Learning to Segment
Abstract. We describe a new approach for learning to perform classbased segmentation using only unsegmented training examples. As in previous methods, we first use training images ...
Eran Borenstein, Shimon Ullman
SSD
2009
Springer
167views Database» more  SSD 2009»
14 years 3 months ago
Continuous Spatial Authentication
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...
Stavros Papadopoulos, Yin Yang, Spiridon Bakiras, ...