Sciweavers

260 search results - page 36 / 52
» Streaming Transformations for XML-STX
Sort
View
ICIP
2006
IEEE
15 years 11 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...
IWIA
2005
IEEE
15 years 3 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
ICCS
2004
Springer
15 years 3 months ago
Simulation Coercion Applied to Multiagent DDDAS
Abstract. The unpredictable run-time configurations of dynamic, datadriven application systems require flexible simulation components that can adapt to changes in the number of i...
Yannick Loitière, David C. Brogan, Paul F. ...
DAGM
2005
Springer
15 years 3 months ago
Combination of Tangent Distance and an Image Distortion Model for Appearance-Based Sign Language Recognition
In this paper, we employ a zero-order local deformation model to model the visual variability of video streams of American sign language (ASL) words. We discuss two possible ways o...
Morteza Zahedi, Daniel Keysers, Thomas Deselaers, ...
ACL2
2006
ACM
15 years 3 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews