Sciweavers

495 search results - page 84 / 99
» Signed quorum systems
Sort
View
SARA
2005
Springer
15 years 3 months ago
Feature-Discovering Approximate Value Iteration Methods
Sets of features in Markov decision processes can play a critical role ximately representing value and in abstracting the state space. Selection of features is crucial to the succe...
Jia-Hong Wu, Robert Givan
82
Voted
ICIAR
2004
Springer
15 years 2 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
ICICS
2004
Springer
15 years 2 months ago
Hydan: Hiding Information in Program Binaries
We present a scheme to steganographically embed information in x86 program binaries. We define sets of functionally-equivalent instructions, and use a key-derived selection proces...
Rakan El-Khalil, Angelos D. Keromytis
IH
2004
Springer
15 years 2 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
3DIM
2003
IEEE
15 years 2 months ago
Digital Preservation of Ancient Cuneiform Tablets Using 3D-Scanning
Cuneiform is the world’s oldest known writing system. Ancient scribes impressed reed styluses onto damp clay to write the approximately 900 different logographic, syllabic and t...
Subodh Kumar, Dean Snyder, Donald Duncan, Jonathan...