Sciweavers

1094 search results - page 170 / 219
» List signature schemes
Sort
View
IWDW
2005
Springer
14 years 1 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
ADC
2004
Springer
116views Database» more  ADC 2004»
14 years 1 months ago
Index Compression Using Fixed Binary Codewords
Document retrieval and web search engines index large quantities of text. The static costs associated with storing the index can be traded against dynamic costs associated with us...
Vo Ngoc Anh, Alistair Moffat
CMMR
2004
Springer
110views Music» more  CMMR 2004»
14 years 1 months ago
A Self-Organizing Map Based Knowledge Discovery for Music Recommendation Systems
Abstract. In this paper, we present an approach for musical artist recommendation based on Self-Organizing Maps (SOMs) of artist reviews from Amazon web site. The Amazon reviews fo...
Shankar Vembu, Stephan Baumann
FPL
2003
Springer
88views Hardware» more  FPL 2003»
14 years 25 days ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar
ICNP
1998
IEEE
13 years 12 months ago
Evaluating the Overheads of Source-Directed Quality-of-Service Routing
Quality-of-service (QoS) routing satisfiesapplication performance requirements and optimizes network resource usage but effective path-selection schemes require the distribution o...
Anees Shaikh, Jennifer Rexford, Kang G. Shin