Sciweavers

849 search results - page 168 / 170
» Completely Non-malleable Schemes
Sort
View
JOC
2006
69views more  JOC 2006»
13 years 7 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
JODL
2006
131views more  JODL 2006»
13 years 7 months ago
Keyframe-based video summarization using Delaunay clustering
Recent advances in technology have made tremendous amount of multimedia information available to the general population. An efficient way of dealing with this new development is t...
Padmavathi Mundur, Yong Rao, Yelena Yesha
MTA
2008
83views more  MTA 2008»
13 years 7 months ago
Caching collaboration and cache allocation in peer-to-peer video systems
Providing scalable video services in a peer-to-peer (P2P) environment is challenging. Since videos are typically large and require high communication bandwidth for delivery, many ...
Ying Cai, Zhan Chen, Wallapak Tavanapong
PAMI
2006
196views more  PAMI 2006»
13 years 7 months ago
Three-Dimensional Model-Based Object Recognition and Segmentation in Cluttered Scenes
Viewpoint independent recognition of free-form objects and their segmentation in the presence of clutter and occlusions is a challenging task. We present a novel 3D model-based alg...
Ajmal S. Mian, Mohammed Bennamoun, Robyn A. Owens
ADHOC
2005
143views more  ADHOC 2005»
13 years 7 months ago
Active query forwarding in sensor networks
While sensor networks are going to be deployed in diverse application specific contexts, one unifying view is to treat them essentially as distributed databases. The simplest mech...
Narayanan Sadagopan, Bhaskar Krishnamachari, Ahmed...