Sciweavers

933 search results - page 106 / 187
» Robust Distributed Source Coding
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
An Internet Voting System Supporting User Privacy
This work introduces the A system1 , an Internetbased, free and open source electronic voting system which employs strong cryptography. Our system is a fully functiona...
Aggelos Kiayias, Michael Korman, David Walluck
DMDW
2000
118views Management» more  DMDW 2000»
13 years 11 months ago
View security as the basis for data warehouse security
Access. permissions in a data warehouse are currently managed in a separate world from the sources' policies. The consequences are inconsistencies, slow response to change, a...
Arnon Rosenthal, Edward Sciore
DCC
1995
IEEE
14 years 1 months ago
Constrained-Storage Vector Quantization with a Universal Codebook
— Many image compression techniques require the quantization of multiple vector sources with significantly different distributions. With vector quantization (VQ), these sources ...
Sangeeta Ramakrishnan, Kenneth Rose, Allen Gersho
BMCBI
2011
13 years 5 months ago
Implementation of Force Distribution Analysis for Molecular Dynamics simulations
Background: The way mechanical stress is distributed inside and propagated by proteins and other biopolymers largely defines their function. Yet, determining the network of intera...
Wolfram Stacklies, Christian Seifert, Frauke Graet...
SASN
2006
ACM
14 years 4 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt