Sciweavers

1190 search results - page 231 / 238
» The Continuing Quest for Abstraction
Sort
View
BMCBI
2007
108views more  BMCBI 2007»
13 years 7 months ago
Design and implementation of a generalized laboratory data model
Background: Investigators in the biological sciences continue to exploit laboratory automation methods and have dramatically increased the rates at which they can generate data. I...
Michael C. Wendl, Scott Smith, Craig S. Pohl, Davi...
CGF
2007
112views more  CGF 2007»
13 years 7 months ago
Shape-aware Volume Illustration
We introduce a novel volume illustration technique for regularly sampled volume datasets. The fundamental difference between previous volume illustration algorithms and ours is th...
Wei Chen, Aidong Lu, David S. Ebert
COMPUTER
2007
153views more  COMPUTER 2007»
13 years 7 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JUCS
2008
147views more  JUCS 2008»
13 years 7 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...