Sciweavers

2265 search results - page 223 / 453
» Recovering Exchanged Data
Sort
View
113
Voted
BTW
2007
Springer
105views Database» more  BTW 2007»
15 years 10 months ago
When the Internet Hits the Road
: The Internet has recovered from the dot-com crash of the early 2000’s and now features an abundance of new, innovative technologies and services. We are also witnessing the eme...
Christian S. Jensen
CVPR
2003
IEEE
15 years 9 months ago
ROD-TV: Reconstruction on Demand by Tensor Voting
A “graphics for vision” approach is proposed to address the problem of reconstruction from a large and imperfect data set: reconstruction on demand by tensor voting, or ROD-TV...
Wai-Shun Tong, Chi-Keung Tang
132
Voted
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
120
Voted
ACISP
2007
Springer
15 years 7 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang
114
Voted
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
15 years 7 months ago
Connecting the dots between news articles
The process of extracting useful knowledge from large datasets has become one of the most pressing problems in today’s society. The problem spans entire sectors, from scientists...
Dafna Shahaf, Carlos Guestrin