Sciweavers

920 search results - page 123 / 184
» Computing the Frequency of Partial Orders
Sort
View
ISN
1998
Springer
15 years 1 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
AINA
2009
IEEE
15 years 4 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
ICNSC
2007
IEEE
15 years 4 months ago
Towards Robot-Assisted Mass-Casualty Triage
Abstract— This paper provides a discussion on how teleoperated robots could be utilized to do the simple triage of victims of a multiple casualty incident. Previous work in the a...
Carolina Chang, Robin R. Murphy
DKE
2007
153views more  DKE 2007»
14 years 9 months ago
Adaptive similarity search in streaming time series with sliding windows
The challenge in a database of evolving time series is to provide efficient algorithms and access methods for query processing, taking into consideration the fact that the databas...
Maria Kontaki, Apostolos N. Papadopoulos, Yannis M...
ICDCS
2011
IEEE
13 years 9 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...