Sciweavers

2297 search results - page 182 / 460
» A fast APRIORI implementation
Sort
View
FAST
2009
14 years 9 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
HIS
2009
14 years 9 months ago
An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering
In this paper, we propose a vector quantization (VQ) -based information hiding scheme that cluster the VQ codeowrds according the codewords' relation on Voronoi Diagram (VD). ...
Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li
TRIDENTCOM
2008
IEEE
15 years 5 months ago
A flexible dual frequency testbed for RFID
This paper presents the setup of a testbed developed for the fast evaluation of RFID systems in two frequency domains. At the one hand the 13.56 MHz and at the other hand the 868 ...
Christoph Angerer, Martin Holzer 0002, Bastian Kne...
PODC
1998
ACM
15 years 3 months ago
Persistent Messages in Local Transactions
: We present a new model for handling messages and state in a distributed application that we call Messages in Local Transactions (MLT). Under this model, messages and data are not...
David E. Lowell, Peter M. Chen
CHES
2000
Springer
114views Cryptology» more  CHES 2000»
15 years 2 months ago
Efficient Generation of Prime Numbers
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appear...
Marc Joye, Pascal Paillier, Serge Vaudenay