Sciweavers

6393 search results - page 929 / 1279
» Randomized Algorithms on the Mesh
Sort
View
ICDIM
2007
IEEE
15 years 11 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
121
Voted
ICRA
2007
IEEE
156views Robotics» more  ICRA 2007»
15 years 11 months ago
Multipartite RRTs for Rapid Replanning in Dynamic Environments
Abstract— The Rapidly-exploring Random Tree (RRT) algorithm has found widespread use in the field of robot motion planning because it provides a single-shot, probabilistically c...
Matthew Zucker, James J. Kuffner, Michael S. Brani...
MSS
2007
IEEE
85views Hardware» more  MSS 2007»
15 years 11 months ago
Providing Quality of Service Support in Object-Based File System
Bourbon is a quality of service framework designed to work with the Ceph object-based storage system. Ceph is a highly scalable distributed file system that can scale up to tens ...
Joel C. Wu, Scott A. Brandt
QEST
2007
IEEE
15 years 11 months ago
Symbolic Bisimulations for Probabilistic Systems
The paper introduces symbolic bisimulations for a simple probabilistic π-calculus to overcome the infinite branching problem that still exists in checking ground bisimulations b...
Peng Wu 0002, Catuscia Palamidessi, Huimin Lin
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 11 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza