Sciweavers

5606 search results - page 1060 / 1122
» Advances in Information Science
Sort
View
CCR
2002
113views more  CCR 2002»
14 years 9 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
CN
1998
122views more  CN 1998»
14 years 9 months ago
The Web: Interactive and Multimedia Education
The World Wide Web is becoming increasingly important in the provision of education, as recognised by several high profile UK government reports. Improved tools for developing We...
Robert Allen
IJPRAI
2002
97views more  IJPRAI 2002»
14 years 9 months ago
Shape Description and Invariant Recognition Employing Connectionist Approach
This paper presents a new approach for shape description and invariant recognition by geometric-normalization implemented by neural networks. The neural system consists of a shape...
Jezekiel Ben-Arie, Zhiqian Wang
CGF
2008
151views more  CGF 2008»
14 years 9 months ago
Navigation and Exploration of Interconnected Pathways
Visualizing pathways, i. e. models of cellular functional networks, is a challenging task in computer assisted biomedicine. Pathways are represented as large collections of interw...
Marc Streit, Michael Kalkusch, Karl Kashofer, Diet...
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 9 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
« Prev « First page 1060 / 1122 Last » Next »