Sciweavers

246 search results - page 22 / 50
» Informed secure watermarking using optimal transport
Sort
View
MEDIAFORENSICS
2010
13 years 6 months ago
On the embedding capacity of DNA strands under substitution, insertion, and deletion mutations
A number of methods have been proposed over the last decade for embedding information within deoxyribonucleic acid (DNA). Since a DNA sequence is conceptually equivalent to a unid...
Félix Balado
IGARSS
2009
13 years 5 months ago
Fog Forecasting, Detection and Monitoring in the UAE using SEVIRI-MSG Data
The UAE location on the edge of a very warm sea and hot and dry desert create the optimal conditions of inland fog forming. The afternoon sea breeze, which is almost a daily event...
Abdulla Bushahab, Ali Al Suwaidi, Hosni Ghedira, K...
ESORICS
2009
Springer
14 years 8 months ago
The Wisdom of Crowds: Attacks and Optimal Constructions
We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages mor...
Carmela Troncoso, Claudia Díaz, Emilia K&au...
OPODIS
2004
13 years 9 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
ATMOS
2008
139views Optimization» more  ATMOS 2008»
13 years 9 months ago
Efficient On-Trip Timetable Information in the Presence of Delays
Abstract. The search for train connections in state-of-the-art commercial timetable information systems is based on a static schedule. Unfortunately, public transportation systems ...
Lennart Frede, Matthias Müller-Hannemann, Mat...