Sciweavers

12183 search results - page 117 / 2437
» Computers under Attacks!
Sort
View
79
Voted
SAC
2004
ACM
15 years 10 months ago
Patient scheduling under uncertainty
Torsten O. Paulussen, Anja Zöller, Armin Hein...
113
Voted
SIBGRAPI
2000
IEEE
15 years 8 months ago
Multiple Correspondences in Stereo Vision under a Genetic Algorithm Approach
José Demisio Simões da Silva, Paulo ...
124
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu
130
Voted
IWDW
2007
Springer
15 years 10 months ago
A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
142
Voted
INFOCOM
2012
IEEE
13 years 7 months ago
BitTrickle: Defending against broadband and high-power reactive jamming attacks
—Reactive jamming is not only cost effective, but also hard to track and remove due to its intermittent jamming behaviors. Frequency Hopping Spread Spectrum (FHSS) and Direct Seq...
Yao Liu, Peng Ning