Sciweavers

1757 search results - page 103 / 352
» Secure Content Validation
Sort
View
ACISP
2004
Springer
15 years 8 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
158
Voted
ICIP
1998
IEEE
16 years 4 months ago
Adaptive Key Frame Extraction using Unsupervised Clustering
Key frame extraction has been recognized as one of the important research issues in video information retrieval. Although progress has been made in key frame extraction, the exist...
Yueting Zhuang, Yong Rui, Thomas S. Huang, Sharad ...
PREMI
2009
Springer
15 years 10 months ago
A Bayesian Approach to Hybrid Image Retrieval
Content based image retrieval (CBIR) has been well studied in the computer vision and multimedia community. Content free image retrieval (CFIR) methods, and their complementary cha...
Pradhee Tandon, C. V. Jawahar
PEWASUN
2005
ACM
15 years 9 months ago
Real-time perceptual QoS satisfactions of multimedia information
Multimedia contents are becoming the major information going through the Internet. Pervasive network infrastructure expedites data delivery with improved network throughput and re...
Ka Lun Eddie Law, Sunny So
142
Voted
PEWASUN
2004
ACM
15 years 8 months ago
An M/MMGI/1/K queuing model for IEEE 802.11 ad hoc networks
An M/MMGI/1/K queuing model is developed for the analysis of IEEE 802.11 DCF using RTS/CTS. Results are based on arbitrary contention conditions, namely, collision probabilities, ...
Mustafa Özdemir, A. Bruce McDonald