Sciweavers

1816 search results - page 185 / 364
» Trace oblivious computation
Sort
View
DCC
2007
IEEE
13 years 9 months ago
Sequential and dynamic frameproof codes
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes. The c...
Maura B. Paterson
IV
2010
IEEE
134views Visualization» more  IV 2010»
13 years 7 months ago
Molecular Rendering with Medieval and Renaissance Color Theory
—This paper describes the application of Medieval and Renaissance color theory to the computer graphic rendering of molecular models. In particular, Alberti’s and Cennini’s c...
Francis T. Marchese, Suzanne M. Marchese
PERCOM
2010
ACM
13 years 7 months ago
Measuring mobile phone energy consumption for 802.11 wireless networking
The complexity of modern mobile phones makes it difficult for developers to understand the power consumption of their applications. Our measurement framework produces fine-graine...
Andrew Colin Rice, Simon Hay
WIOPT
2010
IEEE
13 years 7 months ago
K-shell decomposition for dynamic complex networks
—K-shell (or k-core) graph decomposition methods were introduced as a tool for studying the structure of large graphs. K-shell decomposition methods have been recently proposed [...
Daniele Miorandi, Francesco De Pellegrini
ICPR
2010
IEEE
13 years 7 months ago
A Baseline Dependent Approach for Persian Handwritten Character Segmentation
-- In this paper, an efficient approach to segment Persian off-line handwritten text-line into characters is presented. The proposed algorithm first traces the baseline of the inpu...
Alireza Alaei, P. Nagabhushan, Umapada Pal