Sciweavers

1050 search results - page 70 / 210
» Two methods of authenticated positioning
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 11 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
MICCAI
2010
Springer
14 years 10 months ago
Understanding the Optics to Aid Microscopy Image Segmentation
Abstract. Image segmentation is essential for many automated microscopy image analysis systems. Rather than treating microscopy images as general natural images and rushing into th...
Zhaozheng Yin, Kang Li, Takeo Kanade, Mei Chen
TMC
2010
109views more  TMC 2010»
14 years 10 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
VR
2010
IEEE
188views Virtual Reality» more  VR 2010»
14 years 10 months ago
Illuminating the past: state of the art
Virtual reconstruction and representation of historical environments and objects have been of research interest for nearly two decades. Physically-based and historically accurate ...
Jassim Happa, Mark Mudge, Kurt Debattista, Alessan...
ICIP
2010
IEEE
14 years 9 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...