Sciweavers

24529 search results - page 171 / 4906
» Computing on Authenticated Data
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
SSWMC
2004
15 years 4 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...
146
Voted
JCM
2008
77views more  JCM 2008»
15 years 3 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
179
Voted
BMCBI
2011
14 years 9 months ago
SAQC: SNP array quality control
Background: Genome-wide single-nucleotide polymorphism (SNP) arrays containing hundreds of thousands of SNPs from the human genome have proven useful for studying important human ...
Hsin-Chou Yang, Hsin-Chi Lin, Meijyh Kang, Chun-Ho...
SIGGRAPH
1995
ACM
15 years 6 months ago
Realistic modeling for facial animation
A major unsolved problem in computer graphics is the construction and animation of realistic human facial models. Traditionally, facial models have been built painstakingly by man...
Yuencheng Lee, Demetri Terzopoulos, Keith Waters