Sciweavers

849 search results - page 149 / 170
» Completely Non-malleable Schemes
Sort
View
WOWMOM
2005
ACM
173views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Design and Evaluation of iMesh: An Infrastructure-Mode Wireless Mesh Network
Abstract— Wireless mesh networks are multihop networks of wireless routers typically used for wireless coverage over a large community. Applications include community-scale peer-...
Vishnu Navda, Anand Kashyap, Samir R. Das
VLBV
2005
Springer
14 years 1 months ago
Coding with Temporal Layers or Multiple Descriptions for Lossy Video Transmission
In this paper, we compare temporal layered coding (TLC), as well as single-state coding (SSC), to multi-state video coding (MSVC) in the context of lossy video communications. MSV...
Sila Ekmekci Flierl, Thomas Sikora, Pascal Frossar...
CASES
2004
ACM
14 years 1 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
CSB
2003
IEEE
118views Bioinformatics» more  CSB 2003»
14 years 1 months ago
Automated Protein NMR Resonance Assignments
NMR resonance peak assignment is one of the key steps in solving an NMR protein structure. The assignment process links resonance peaks to individual residues of the target protei...
Xiang Wan, Dong Xu, Carolyn M. Slupsky, Guohui Lin