Sciweavers

985 search results - page 61 / 197
» On the validity of digital signatures
Sort
View
IMSA
2001
143views Multimedia» more  IMSA 2001»
13 years 10 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 6 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
EDBT
2008
ACM
178views Database» more  EDBT 2008»
14 years 9 months ago
Compacting music signatures for efficient music retrieval
Music information retrieval is becoming very important with the ever-increasing growth of music content in digital libraries, peer-to-peer systems and the internet. While it is ea...
Bin Cui, H. V. Jagadish, Beng Chin Ooi, Kian-Lee T...
IMSCCS
2007
IEEE
14 years 3 months ago
Control Flow Checking Algorithm using Soft-based Intra-/Inter-block Assigned-Signature
In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electro...
Yanxia Wu, Guochang Gu, Shaobin Huang, Jun Ni
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 10 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...