Sciweavers

987 search results - page 7 / 198
» Key Characteristics of Hymns
Sort
View
ISSADS
2005
Springer
14 years 29 days ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...
ICIP
2006
IEEE
14 years 1 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
14 years 22 days ago
Multi-robot task allocation: analyzing the complexity and optimality of key architectures
— Important theoretical aspects of multi-robot coordination mechanisms have, to date, been largely ignored. To address part of this negligence, we focus on the problem of multi-r...
Brian P. Gerkey, Maja J. Mataric
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 1 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner
ACL
2009
13 years 5 months ago
An Ontology-Based Approach for Key Phrase Extraction
Automatic key phrase extraction is fundamental to the success of many recent digital library applications and semantic information retrieval techniques and a difficult and essenti...
Chau Q. Nguyen, Tuoi T. Phan