Sciweavers

667 search results - page 65 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
JMM2
2008
228views more  JMM2 2008»
14 years 12 months ago
Adaptive AC-Coefficient Prediction for Image Compression and Blind Watermarking
In this work, an adaptive image compression algorithm is proposed based on the prediction of AC coefficients in Discrete Cosine Transform (DCT) block during reconstruction of image...
Kilari Veera Swamy, S. Srinivas Kumar
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
15 years 6 months ago
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Despite the rapid adoption of Voice over IP (VoIP), its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be enc...
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...
AINA
2008
IEEE
15 years 1 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
15 years 1 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
BMCBI
2006
144views more  BMCBI 2006»
14 years 12 months ago
methBLAST and methPrimerDB: web-tools for PCR based methylation analysis
Background: DNA methylation plays an important role in development and tumorigenesis by epigenetic modification and silencing of critical genes. The development of PCR-based methy...
Filip Pattyn, Jasmien Hoebeeck, Piet Robbrecht, Ev...