Sciweavers

799 search results - page 78 / 160
» Improving the feasibility pump
Sort
View
MSWIM
2005
ACM
15 years 4 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
ICWL
2005
Springer
15 years 4 months ago
The Research of Mining Association Rules Between Personality and Behavior of Learner Under Web-Based Learning Environment
: Discovering the relationship between behavior and personality of learner in the web-based learning environment is a key to guide learners in the learning process. This paper prop...
Jin Du, Qinghua Zheng, Haifei Li, Wenbin Yuan
IH
2005
Springer
15 years 4 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 4 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
SCALESPACE
2005
Springer
15 years 4 months ago
Sparse Finite Element Level-Sets for Anisotropic Boundary Detection in 3D Images
Level-Set methods have been successfully applied to 2D and 3D boundary detection problems. The geodesic active contour model has been particularly successful. Several algorithms fo...
Martin Weber, Andrew Blake, Roberto Cipolla