Sciweavers

1871 search results - page 139 / 375
» The Ephemeral Pairing Problem
Sort
View
WCC
2005
Springer
130views Cryptology» more  WCC 2005»
15 years 5 months ago
On the Design of Codes for DNA Computing
In this paper, we describe a broad class of problems arising in the context of designing codes for DNA computing. We primarily focus on design considerations pertaining to the phen...
Olgica Milenkovic, Navin Kashyap
MMB
2004
Springer
15 years 5 months ago
SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis
Ever-increasing attention has been drawn to source specific multicast in the Internet society. In this paper, a novel multicast scheme, called Scalable Recursive Explicit Multicast...
Yewen Cao, Khalid Al-Begain
SDMW
2004
Springer
15 years 5 months ago
Identifying Sensitive Associations in Databases for Release Control
In a database system, authorization-based access-control is generally the first line of defense, preventing unauthorized accesses to secret or sensitive data. However, this mechan...
Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodi...
CVPR
2003
IEEE
15 years 5 months ago
Dynamic Depth Recovery from Unsynchronized Video Streams
In this paper, we propose an algorithm for estimating dense depth information of dynamic scenes from multiple video streams captured using unsynchronized stationary cameras. We so...
Chunxiao Zhou, Hai Tao
IBPRIA
2003
Springer
15 years 4 months ago
Robust Extraction of Vertices in Range Images by Constraining the Hough Transform
We describe a technique for extracting vertices from range images of cluttered box-like objects. Edge detection is performed and an edge map is acquired. Extraction of vertices is ...
Dimitrios Katsoulas