Sciweavers

21 search results - page 4 / 5
» Fundamentals of Data Hiding Security and Their Application t...
Sort
View
USENIX
2003
13 years 7 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
HIPC
2005
Springer
13 years 11 months ago
Design and Implementation of the HPCS Graph Analysis Benchmark on Symmetric Multiprocessors
Graph theoretic problems are representative of fundamental computations in traditional and emerging scientific disciplines like scientific computing, computational biology and b...
David A. Bader, Kamesh Madduri
BMCBI
2010
132views more  BMCBI 2010»
13 years 5 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...
RTSS
2009
IEEE
14 years 15 days ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
13 years 3 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs