Sciweavers

7596 search results - page 1318 / 1520
» Challenges in forensic computing
Sort
View
SIBGRAPI
2009
IEEE
15 years 11 months ago
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
—The strategies for the preservation of historical documents can include their digitization, which is an effective way to make them publicly available while preventing degradatio...
Natalia C. Batista, Ana Paula Brandão Lopes...
ICST
2009
IEEE
15 years 11 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
INFOCOM
2009
IEEE
15 years 11 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 11 months ago
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
We enrich the classical notion of group key exchange (GKE) protocols by a new property that allows each pair of users to derive an independent peer-to-peer (p2p) key on-demand and ...
Mark Manulis
BICOB
2009
Springer
15 years 11 months ago
A Bayesian Approach to High-Throughput Biological Model Generation
Abstract. With the availability of hundreds and soon-to-be thousands of complete genomes, the construction of genome-scale metabolic models for these organisms has attracted much a...
Xinghua Shi, Rick L. Stevens
« Prev « First page 1318 / 1520 Last » Next »