Sciweavers

3497 search results - page 96 / 700
» Making Distributed Applications Robust
Sort
View
144
Voted
MM
2006
ACM
155views Multimedia» more  MM 2006»
15 years 8 months ago
Robust voting algorithm based on labels of behavior for video copy detection
This paper presents an efficient approach for copies detection in a large videos archive consisting of several hundred of hours. The video content indexing method consists of ext...
Julien Law-To, Olivier Buisson, Valérie Gou...
DAC
2009
ACM
15 years 7 days ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
IPPS
2006
IEEE
15 years 8 months ago
Anticipated distributed task scheduling for grid environments
Heterogeneous distributed environments or grid environments provide large computing resources for the execution of large scientific applications. The effective use of those plat...
Thomas Rauber, Gudula Rünger
136
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Data hiding in hard-copy text documents robust to print, scan and photocopy operations
This paper describes a method for hiding data inside printed text documents that is resilient to print/scan and photocopying operations. Using the principle of channel coding with...
Avinash L. Varna, Shantanu Rane, Anthony Vetro
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 8 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui