Sciweavers

920 search results - page 148 / 184
» Selecting Secure Passwords
Sort
View
ICRA
2010
IEEE
193views Robotics» more  ICRA 2010»
13 years 6 months ago
Model-based motion tracking system using distributed network cameras
— For a coexisting and collaborative society that incorporates humans and robots, the detection, tracking, and recognition of human motion are indispensable techniques for a robo...
Yumi Iwashita, Ryo Kurazume, Takamitsu Mori, Masak...
26
Voted
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 5 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
IACR
2011
110views more  IACR 2011»
12 years 7 months ago
Decoding One Out of Many
Generic decoding of linear codes is the best known attack against most code-based cryptosystems. Understanding and measuring the complexity of the best decoding technique is thus n...
Nicolas Sendrier
INFOCOM
2012
IEEE
12 years 6 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 2 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan