Sciweavers

1610 search results - page 210 / 322
» Identity Based Multisignatures
Sort
View
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
103
Voted
ICSNC
2007
IEEE
15 years 7 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
101
Voted
IPCCC
2007
IEEE
15 years 7 months ago
Optimal Cluster Head Selection in the LEACH Architecture
LEACH (Low Energy Adaptive Clustering Hierarchy) [1] is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA ...
Haiming Yang, Biplab Sikdar
IPPS
2007
IEEE
15 years 7 months ago
Towards A Better Understanding of Workload Dynamics on Data-Intensive Clusters and Grids
This paper presents a comprehensive statistical analysis of workloads collected on data-intensive clusters and Grids. The analysis is conducted at different levels, including Virt...
Hui Li, Lex Wolters
133
Voted
IWPSE
2007
IEEE
15 years 7 months ago
Structural analysis and visualization of C++ code evolution using syntax trees
We present a method to detect and visualize evolution patterns in C++ source code. Our method consists of three steps. First, we extract an annotated syntax tree (AST) from each v...
Fanny Chevalier, David Auber, Alexandru Telea