Sciweavers

1352 search results - page 201 / 271
» Designing Security Requirements Models Through Planning
Sort
View
APVIS
2004
13 years 10 months ago
Semi-Automatic Feature Delineation In Medical Images
Resection or ablation of tumours is one treatment available for liver cancer. This delicate operation consists of removing the tumour(s) and surrounding healthy tissues. The surge...
Robin Martin, Nicole Bordes, Thomas Hugh, Bernard ...
IGARSS
2010
13 years 6 months ago
Lidar education at Georgia Tech
The Georgia Tech Research Institute teamed with a local undergraduate women's institution, Agnes Scott College, to develop an eyesafe lidar for atmospheric remote sensing as ...
Gary Gimmestad, Leanne West
WICON
2008
13 years 10 months ago
A graph based routing algorithm for multi-hop cognitive radio networks
Cognitive radio networks that allow dynamic spectrum access are considered spectrally more efficient than networks using fixed spectral allocation. These networks are characterize...
Yogesh Reddy Kondareddy, Prathima Agrawal
WISEC
2010
ACM
14 years 3 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
14 years 19 days ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim