Sciweavers

287 search results - page 28 / 58
» Audio authentication based on distributed source coding
Sort
View
COMPSAC
2005
IEEE
15 years 3 months ago
Preventing Illegal Usage of Mobile Phone Software
Mobile software industry is suffering from the illegal usage of the software. PKI will not be a solution for small software distribution. We introduce a lightweight but safe metho...
Yun-Sam Kim, Eun-Sun Cho
57
Voted
CVPR
2007
IEEE
15 years 11 months ago
Illumination Multiplexing within Fundamental Limits
Taking a sequence of photographs using multiple illumination sources or settings is central to many computer vision and graphics problems. A growing number of recent methods use m...
Netanel Ratner, Yoav Y. Schechner
GCC
2007
Springer
14 years 11 months ago
Component Based Legacy Program Executing over Grid
Executing the legacy program over grid is very important and necessary. To reuse the legacy program, we developed a method based on Component for executing the legacy code. We can...
Le Du, Yongwei Wu, Chunlu Wang
ICIP
2006
IEEE
15 years 11 months ago
A Multi-Terminal Model-Based Video Compression Algorithm
We present a novel 3D model-based distributed video coding algorithm. It is based on independent, model-based tracking of multiple sources and distributed coding of the tracked fe...
Bi Song, Amit K. Roy Chowdhury, Ertem Tuncel
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
15 years 3 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman