Sciweavers

42738 search results - page 8474 / 8548
» Search Computing Systems
Sort
View
111
Voted
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
15 years 4 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
121
Voted
ETFA
2006
IEEE
15 years 4 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
AC
2003
Springer
15 years 4 months ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...
119
Voted
ATAL
2003
Springer
15 years 4 months ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo
119
Voted
BIBE
2001
IEEE
179views Bioinformatics» more  BIBE 2001»
15 years 4 months ago
Texture-Based 3-D Brain Imaging
Different modalities in biomedical imaging, like CT, MRI and PET scanners, provide detailed crosssectional views of the human anatomy. The imagery obtained from these scanning dev...
Sagar Saladi, Pujita Pinnamaneni, Joerg Meyer
« Prev « First page 8474 / 8548 Last » Next »