Sciweavers

1094 search results - page 194 / 219
» List signature schemes
Sort
View
ICC
2007
IEEE
110views Communications» more  ICC 2007»
14 years 1 months ago
Distributed Early Worm Detection Based on Payload Histograms
— Epidemic worms has become a social problem owing to their potency in paralyzing the Internet, thus affecting our way of life. Recent researches have pointed out that epidemic w...
Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirw...
DRM
2005
Springer
14 years 1 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
IPSN
2004
Springer
14 years 27 days ago
The impact of spatial correlation on routing with compression in wireless sensor networks
The efficacy of data aggregation in sensor networks is a function of the degree of spatial correlation in the sensed phenomenon. While several data aggregation (i.e., routing with...
Sundeep Pattem, Bhaskar Krishnamachari, Ramesh Gov...
SIGECOM
2010
ACM
154views ECommerce» more  SIGECOM 2010»
14 years 10 days ago
Ranking games that have competitiveness-based strategies
This paper studies —from the perspective of efficient computation— a type of competition that is widespread throughout the plant and animal kingdoms, higher education, politic...
Leslie Ann Goldberg, Paul W. Goldberg, Piotr Kryst...
VISUALIZATION
1996
IEEE
13 years 11 months ago
Real-time Slicing of Data Space
This can be a costly operation. When the data is arranged according to its three-dimensional coordinates, calculating the contour surfaces requires examining each data cell. Avoidi...
Roger Crawfis