Sciweavers

985 search results - page 128 / 197
» On the validity of digital signatures
Sort
View
DAC
1999
ACM
14 years 11 months ago
Optimization-Intensive Watermarking Techniques for Decision Problems
Recently, a number of watermarking-based intellectual property protection techniques have been proposed. Although they have been applied to different stages in the design process ...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
ISBI
2006
IEEE
14 years 10 months ago
Pattern recognition approaches to compute image similarities: application to age related morphological change
We are studying the genetic influence on rates of age related muscle degeneration in C. elegans. For this, we built pattern recognition tools to calculate a morphological score gi...
Nikita Orlov, Josiah Johnston, Tomasz J. Macura, C...
PERCOM
2004
ACM
14 years 9 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
ISBI
2009
IEEE
14 years 4 months ago
Structural Annotation of EM Images by Graph Cut
Biological images have the potential to reveal complex signatures that may not be amenable to morphological modeling in terms of shape, location, texture, and color. An effective ...
Hang Chang, Manfred Auer, Bahram Parvin
SERA
2009
Springer
14 years 4 months ago
Syntactic and Semantic Prediction in Dynamic Languages
In the context of computer programming, the importance of computer assistance is being understood by many developer communities. Developers are e.g. using the same well known expre...
Jakub Mísek, Filip Zavoral