Sciweavers

1875 search results - page 343 / 375
» Modeling the Security of Steganographic Systems
Sort
View
CSREASAM
2008
13 years 11 months ago
3D Face Recognition for Unattended Border Control
Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 on...
Christoph Busch, Alexander Nouak
USENIX
2003
13 years 11 months ago
CUP: Controlled Update Propagation in Peer-to-Peer Networks
— This paper proposes CUP, a protocol for performing Controlled Update Propagation to maintain caches of metadata in peer-to-peer networks. To moderate propagation without imposi...
Mema Roussopoulos, Mary Baker
ENTCS
2007
105views more  ENTCS 2007»
13 years 9 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
TWC
2008
176views more  TWC 2008»
13 years 9 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
CORR
2004
Springer
142views Education» more  CORR 2004»
13 years 9 months ago
Global Grids and Software Toolkits: A Study of Four Grid Middleware Technologies
: Grid is an infrastructure that involves the integrated and collaborative use of computers, networks, databases and scientific instruments owned and managed by multiple organizati...
Parvin Asadzadeh, Rajkumar Buyya, Chun Ling Kei, D...