Sciweavers

7773 search results - page 1413 / 1555
» On generalized Frame-Stewart numbers
Sort
View
TIFS
2010
144views more  TIFS 2010»
14 years 8 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu
TPDS
2010
155views more  TPDS 2010»
14 years 8 months ago
Streamline: An Optimal Distribution Algorithm for Peer-to-Peer Real-Time Streaming
—In this paper we propose and evaluate an overlay distribution algorithm for P2P, chunk-based, streaming systems over forest-based topologies. In such systems, the stream is divi...
Giuseppe Bianchi, Nicola Blefari-Melazzi, Lorenzo ...
TVCG
2010
157views more  TVCG 2010»
14 years 8 months ago
Metric-Driven RoSy Field Design and Remeshing
—Designing rotational symmetry fields on surfaces is an important task for a wide range of graphics applications. This work introduces a rigorous and practical approach for auto...
Yu-Kun Lai, Miao Jin, Xuexiang Xie, Ying He 0001, ...
CASES
2010
ACM
14 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
CCCG
2010
14 years 8 months ago
Determining the robustness of sensor barriers
Various notions of coverage provided by wireless sensor networks have attracted considerable attention over the past few years. In general, coverage can be expressed geometrically...
David G. Kirkpatrick
« Prev « First page 1413 / 1555 Last » Next »