Sciweavers

666 search results - page 75 / 134
» Fair watermarking techniques
Sort
View
FC
2008
Springer
81views Cryptology» more  FC 2008»
14 years 11 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper
DAGSTUHL
2007
14 years 11 months ago
Empirical Studies in End-User Software Engineering and Viewing Scientific Programmers as End-Users - Position Statement -
My work has two relationships with End User Software Engineering. First, as an Empirical Software Engineer, I am interested in meeting with people who do research into techniques ...
Jeffrey Carver
CG
2008
Springer
14 years 10 months ago
Images of a vibrating Koch drum
We illustrate the vibrational modes of a drum shaped like the Koch snowflake. Vibrational modes are computed using a fairly standard finite difference technique applied to a recen...
Mark McClure
COLING
2010
14 years 5 months ago
Inducing Fine-Grained Semantic Classes via Hierarchical and Collective Classification
Research in named entity recognition and mention detection has typically involved a fairly small number of semantic classes, which may not be adequate if semantic class informatio...
Md. Altaf ur Rahman, Vincent Ng
TC
2011
14 years 4 months ago
Hybrid Binary-Ternary Number System for Elliptic Curve Cryptosystems
—Single and double scalar multiplications are the most computational intensive operations in elliptic curve based cryptosystems. Improving the performance of these operations is ...
Jithra Adikari, Vassil S. Dimitrov, Laurent Imbert