Sciweavers

367 search results - page 56 / 74
» The Return of the Sensitivity Attack
Sort
View
ICIP
2000
IEEE
14 years 9 months ago
Copyright Labeling of Printed Images
Digital Watermarking is a labeling technique for digital images which embeds a code into the digital data so the data is marked. Watermarking techniques previously developed deal ...
Hagit Zabrodsky Hel-Or
ICCAD
2005
IEEE
81views Hardware» more  ICCAD 2005»
14 years 4 months ago
Kauffman networks: analysis and applications
Abstract— A Kauffman network is an abstract model of gene regulatory networks. Each gene is represented by a vertex. An edge from one vertex to another implies that the former ge...
Elena Dubrova, Maxim Teslenko, Andrés Marti...
EDBT
2010
ACM
110views Database» more  EDBT 2010»
14 years 2 months ago
The hardness and approximation algorithms for l-diversity
The existing solutions to privacy preserving publication can be classified into the theoretical and heuristic categories. The former guarantees provably low information loss, whe...
Xiaokui Xiao, Ke Yi, Yufei Tao
PERCOM
2009
ACM
14 years 2 months ago
Localizing Jammers in Wireless Networks
Abstract—Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not ...
Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu
SASO
2009
IEEE
14 years 2 months ago
Evolution of Probabilistic Consensus in Digital Organisms
—The complexity of distributed computing systems and their increasing interaction with the physical world impose challenging requirements in terms of adaptation, robustness, and ...
David B. Knoester, Philip K. McKinley