Sciweavers

1005 search results - page 117 / 201
» On genomic coding theory
Sort
View
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 1 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
NETWORKING
2007
13 years 9 months ago
Multi-rate Support for Network-Wide Broadcasting in MANETs
Abstract. Mobile ad-hoc networks (MANETs) utilize broadcast channels, where wireless transmissions occur from one user to many others. In a broadcast channel the same transmission ...
Tolga Numanoglu, Wendi Rabiner Heinzelman, Bulent ...
ECIS
2001
13 years 9 months ago
Knowledge integration processes within the context of enterprise resources planning (ERP) systems implementation
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
13 years 8 months ago
H.264 stream replacement watermarking with CABAC encoding
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
Dekun Zou, Jeffrey A. Bloom
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 8 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani