Sciweavers

1799 search results - page 337 / 360
» Design considerations for MRAM
Sort
View
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 9 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
MOBICOM
2004
ACM
15 years 9 months ago
Performance evaluation of safety applications over DSRC vehicular ad hoc networks
In this paper we conduct a feasibility study of delay-critical safety applications over vehicular ad hoc networks based on the emerging dedicated short range communications (DSRC)...
Jijun Yin, Tamer A. ElBatt, Gavin Yeung, Bo Ryu, S...
CAISE
2004
Springer
15 years 9 months ago
Ontology for Characterising Architecture Frameworks
This paper outlines an ontology for characterising architecture frameworks. The ontology is based on the metamodel of MAF, and is currently being tried out on a set of well-known e...
Oddrun Pauline Ohren
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 9 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
ICIAR
2004
Springer
15 years 9 months ago
Neuro-Fuzzy Method for Automated Defect Detection in Aluminium Castings
The automated flaw detection in aluminium castings consists of two steps: a) identification of potential defects using image processing techniques, and b) classification of pote...
Sergio Hernández, Doris Saez, Domingo Mery