Sciweavers

620 search results - page 102 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
SSWMC
2004
14 years 11 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
14 years 10 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
87
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
A mobile peer-to-peer system for opportunistic content-centric networking
In this work we present a middleware architecture for a mobile peer-to-peer content distribution system. Our architecture allows wireless content dissemination between mobile node...
Ólafur Ragnar Helgason, Emre A. Yavuz, Sylv...
HAPTICS
2008
IEEE
14 years 9 months ago
Efficient Transport Protocol for Networked Haptics Applications
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. Th...
Raul Wirz, Manuel Ferre, Raúl Marín,...
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
14 years 9 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...