Sciweavers

4805 search results - page 174 / 961
» On the Analysis of Indexing Schemes
Sort
View
PDP
2010
IEEE
14 years 1 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
ICICS
2003
Springer
14 years 1 months ago
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
In this paper, a digital video watermarking algorithm is proposed. We present a novel DWT-based blind digital video watermarking scheme with scrambled watermark and error correctin...
Pat Pik-Wah Chan, Michael R. Lyu
INFOCOM
2002
IEEE
14 years 1 months ago
A Robust Acknowledgement Scheme for Unreliable Flows
Abstract—The increasing presence of UDP traffic in the Internet and the emergence of sensing applications which do not require full reliability motivates the search for a robust...
Hoi-sheung Wilson So, Ye Xia, Jean C. Walrand
ISCAS
1999
IEEE
131views Hardware» more  ISCAS 1999»
14 years 19 days ago
A multilevel modulation scheme for high-speed wireless infrared communications
To investigate short-distance, point-to-point, infrared channels, a test-bench and circuits were constructed to determine the limitations ofexisting optoelectronics. Theresults of...
S. Hranilovic, D. A. Johns
HYBRID
2000
Springer
13 years 12 months ago
Computing Optimal Operation Schemes for Chemical Plants in Multi-batch Mode
We propose a computer-aided methodology to automatically generate time optimal production schemes for chemical batch plants operating in multi-batch mode. Our approach is based on ...
Peter Niebert, Sergio Yovine