Sciweavers

490 search results - page 83 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
ICMCS
2006
IEEE
145views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A New Study on Distance Metrics as Similarity Measurement
Distance metric is widely used in similarity estimation. In this paper we find that the most popular Euclidean and Manhattan distance may not be suitable for all data distribution...
Jie Yu, Jaume Amores, Nicu Sebe, Qi Tian
COMCOM
2006
194views more  COMCOM 2006»
14 years 9 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
61
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Locating need-to-translate constant strings for software internationalization
Modern software applications require internationalization to be distributed to different regions of the world. In various situations, many software applications are not internatio...
Xiaoyin Wang, Lu Zhang, Tao Xie, Hong Mei, Jiasu S...
59
Voted
SIGMETRICS
2002
ACM
128views Hardware» more  SIGMETRICS 2002»
14 years 9 months ago
High-density model for server allocation and placement
It is well known that optimal server placement is NP-hard. We present an approximate model for the case when both clients and servers are dense, and propose a simple server alloca...
Craig W. Cameron, Steven H. Low, David X. Wei
OSDI
2006
ACM
15 years 10 months ago
Operating System Profiling via Latency Analysis
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...