Sciweavers

24529 search results - page 245 / 4906
» Computing on Authenticated Data
Sort
View
121
Voted
EUROMICRO
1997
IEEE
15 years 7 months ago
What computer architecture can learn from computational intelligence-and vice versa
This paper considers whether the seemingly disparate fields of Computational Intelligence (CI) and computer architecture can profit from each others’ principles, results and e...
Ronald Moore, Bernd Klauer, Klaus Waldschmidt
131
Voted
ICPPW
2003
IEEE
15 years 9 months ago
From Distributed Sequential Computing to Distributed Parallel Computing
One approach to distributed parallel programming is to utilize self-migrating threads. Computations can be distributed first, and parallelized second. The first step produces a ...
Lei Pan, Lubomir Bic, Michael B. Dillencourt, Ming...
ICIP
2009
IEEE
16 years 4 months ago
Detection Of Forgery In Paintings Using Supervised Learning
This paper examines whether machine learning and image analysis tools can be used to assist art experts in the authentication of unknown or disputed paintings. Recent work on this...
139
Voted
IEEEIAS
2009
IEEE
15 years 10 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
124
Voted
ACISP
1998
Springer
15 years 7 months ago
Meta Objects for Access Control: Role-Based Principals
Abstract. Most current object-based distributed systems support access control lists for access control. However, it is difficult to determine which principal information to use fo...
Thomas Riechmann, Jürgen Kleinöder