Sciweavers

252 search results - page 49 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup
BMCBI
2004
122views more  BMCBI 2004»
13 years 7 months ago
A comprehensive comparison of comparative RNA structure prediction approaches
Background: An increasing number of researchers have released novel RNA structure analysis and prediction algorithms for comparative approaches to structure prediction. Yet, indep...
Paul P. Gardner, Robert Giegerich
GLOBECOM
2009
IEEE
14 years 2 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained signiï¬cant interests for key management and privacy protection, but the previously proposed schemes using set metrics for ï¬nge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
ICC
2007
IEEE
129views Communications» more  ICC 2007»
14 years 1 months ago
Time Sharing Policy in Wireless Networks for Variable Rate Transmission
— For most of wireless services with variable rate transmission, both average rate and rate oscillation are important performance metrics. One often needs to decide how much rate...
Xiaolu Zhang, Meixia Tao, Chun Sum Ng
INFOCOM
2003
IEEE
14 years 22 days ago
Exploring the trade-off between label size and stack depth in MPLS Routing
— Multiprotocol Label Switching or MPLS technology is being increasingly deployed by several of the largest Internet service providers to solve problems such as trafï¬c engineer...
Anupam Gupta, Amit Kumar, Rajeev Rastogi