Sciweavers

6724 search results - page 1344 / 1345
» Models. Models. Models. So What
Sort
View
ASIACRYPT
2011
Springer
12 years 7 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
WACV
2012
IEEE
12 years 2 months ago
Dynamic and invisible messaging for visual MIMO
The growing ubiquity of cameras in hand-held devices and the prevalence of electronic displays in signage creates a novel framework for wireless communications. Traditionally, the...
Wenjia Yuan, Kristin J. Dana, Ashwin Ashok, Marco ...
CCS
2009
ACM
14 years 8 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
TRECVID
2007
13 years 8 months ago
PicSOM Experiments in TRECVID 2007
Our experiments in TRECVID 2007 include participation in the high-level feature extraction, search, and video summarization tasks, using a common system framework based on multipl...
Markus Koskela, Mats Sjöberg, Ville Viitaniem...
BMCBI
2006
89views more  BMCBI 2006»
13 years 7 months ago
SPODOBASE : an EST database for the lepidopteran crop pest Spodoptera
Background: The Lepidoptera Spodoptera frugiperda is a pest which causes widespread economic damage on a variety of crop plants. It is also well known through its famous Sf9 cell ...
Vincent Nègre, Thierry Hotelier, Anne-Natha...
« Prev « First page 1344 / 1345 Last » Next »