Sciweavers

2624 search results - page 341 / 525
» The 2LIP model and its implementations
Sort
View
TCS
2008
13 years 10 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
TDSC
2008
99views more  TDSC 2008»
13 years 10 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...
TIFS
2008
120views more  TIFS 2008»
13 years 10 months ago
Determining Image Origin and Integrity Using Sensor Noise
In this paper, we provide a unified framework for identifying the source digital camera from its images and for revealing digitally altered images using photo-response nonuniformit...
Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan...
CGF
2005
252views more  CGF 2005»
13 years 10 months ago
Support Vector Machines for 3D Shape Processing
We propose statistical learning methods for approximating implicit surfaces and computing dense 3D deformation fields. Our approach is based on Support Vector (SV) Machines, which...
Florian Steinke, Bernhard Schölkopf, Volker B...
JMM2
2007
117views more  JMM2 2007»
13 years 10 months ago
Image Segmentation using Multi-Coloured Active Illumination
— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...