Sciweavers

7055 search results - page 72 / 1411
» Some New 4-Designs
Sort
View
SSWMC
2004
15 years 2 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
WSCG
2004
149views more  WSCG 2004»
15 years 2 months ago
Depth Detection Through Interpolation Functions: A New Method
There are some different methods used for depth perception. In this paper, a new method for the depth perception, by using a single camera based on an interpolation, is introduced...
Mahdi Mirzabaki
PPSC
1997
15 years 2 months ago
New Implementations and Results for the NAS Parallel Benchmarks 2
We present new implementations and results for the NAS Parallel Benchmarks 2 suite. The suite currently consists of seven programs. Of these LU, SP, BT, MG and FT have previously ...
William Saphir, Rob F. Van der Wijngaart, Alex Woo...
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 1 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani
CORR
2008
Springer
120views Education» more  CORR 2008»
15 years 1 months ago
A new distance for high level RNA secondary structure comparison
We describe an algorithm for comparing two RNA secondary structures coded in the form of trees that introduces two new operations, called node fusion and edge fusion, besides the t...
Julien Allali, Marie-France Sagot