Sciweavers

490 search results - page 44 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
ICCS
2007
Springer
15 years 1 months ago
Distributed Applications from Scratch: Using GridMD Workflow Patterns
A new approach is proposed to generate workflow scenarios of scientific applications such as Molecular Dynamics and Monte-Carlo simulations in a distributed environment. The approa...
I. Morozov, Ilya Valuev
IEEEARES
2008
IEEE
15 years 4 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 2 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
ICIP
2002
IEEE
15 years 11 months ago
Lossless video coding using optimal 3D prediction
In this paper, we consider the problem of lossless compression of video by taking into account temporal information. Video lossless compression is an interesting possibility in th...
Dania Brunello, Giancarlo Calvagno, Gian Antonio M...
95
Voted
MM
2009
ACM
217views Multimedia» more  MM 2009»
15 years 4 months ago
Label to region by bi-layer sparsity priors
In this work, we investigate how to automatically reassign the manually annotated labels at the image-level to those contextually derived semantic regions. First, we propose a bi-...
Xiaobai Liu, Bin Cheng, Shuicheng Yan, Jinhui Tang...