Sciweavers

173 search results - page 25 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov
INFORMATICALT
2006
102views more  INFORMATICALT 2006»
14 years 9 months ago
Parallel DEM Software for Simulation of Granular Media
The paper describes the development and performance of parallel algorithms for the discrete element method (DEM) software. Spatial domain decomposition strategy and message passing...
Algirdas Maknickas, Arnas Kaceniauskas, Rimantas K...
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
15 years 10 months ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen
MASS
2010
156views Communications» more  MASS 2010»
14 years 7 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ICIP
2009
IEEE
15 years 10 months ago
2d-3d Registration Of Deformable Shapes With Manifold Projection
We present an algorithm able to register a known 3D deformable model to a set of 2D matched points extracted from a single image. Unlike previous approaches, the problem is solved...