Sciweavers

7544 search results - page 1370 / 1509
» Network Forensics Analysis
Sort
View
CVPR
2008
IEEE
15 years 6 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
FC
2008
Springer
82views Cryptology» more  FC 2008»
15 years 6 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
ASAP
2010
IEEE
143views Hardware» more  ASAP 2010»
15 years 6 months ago
Loop transformations for interface-based hierarchies IN SDF graphs
Data-flow has proven to be an attractive computation model for programming digital signal processing (DSP) applications. A restricted version of data-flow, termed synchronous data...
Jonathan Piat, Shuvra S. Bhattacharyya, Mickaë...
APVIS
2008
15 years 5 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma
BIOCOMP
2008
15 years 5 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
« Prev « First page 1370 / 1509 Last » Next »