Sciweavers

905 search results - page 71 / 181
» The Case Against Micropayments
Sort
View
JOC
2006
69views more  JOC 2006»
13 years 8 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
ICC
2011
IEEE
201views Communications» more  ICC 2011»
12 years 7 months ago
Survivable Optical Grid Dimensioning: Anycast Routing with Server and Network Failure Protection
Abstract—Grids can efficiently deal with challenging computational and data processing tasks which cutting edge science is generating today. So-called e-Science grids cope with ...
Chris Develder, Jens Buysse, Ali Shaikh, Brigitte ...
CVPR
2007
IEEE
14 years 10 months ago
Bridging the Gap between Detection and Tracking for 3D Monocular Video-Based Motion Capture
We combine detection and tracking techniques to achieve robust 3?D motion recovery of people seen from arbitrary viewpoints by a single and potentially moving camera. We rely on d...
Andrea Fossati, Miodrag Dimitrijevic, Vincent Lepe...
ICIP
2006
IEEE
14 years 9 months ago
Cover Selection for Steganographic Embedding
The primary goal of image steganography techniques has been to maximize embedding rate while minimizing the detectability of the resulting stego images against steganalysis techni...
Mehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon
DCC
2005
IEEE
14 years 7 months ago
The Near Resolvable 2-(13, 4, 3) Designs and Thirteen-Player Whist Tournaments
A v-player whist tournament is a schedule of games, where in each round the v players are partitioned into games of four players each with at most one player left over. In each ga...
Harri Haanpää, Petteri Kaski