ISCAS OpenIR

浏览/检索结果: 共47条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
mobile scheduling for spatiotemporal detection in wireless sensor networks 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 卷号: 21, 期号: 12, 页码: 1851-1866
作者:  Xing Guoliang;  Wang Jianping;  Yuan Zhaohui;  Tan Rui;  Sun Limin;  Huang Qingfeng;  Jia Xiaohua;  So Hing Cheung
Adobe PDF(2197Kb)  |  收藏  |  浏览/下载:31/0  |  提交时间:2011/05/23
Data FusionAlgorithm/protocol Design And AnalysisWireless Sensor Networks
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round 期刊论文
IET Information Security, 2010, 卷号: 4, 期号: 3, 页码: 167-184
作者:  Zhao X.;  Feng D.
Adobe PDF(659Kb)  |  收藏  |  浏览/下载:40/0  |  提交时间:2011/05/23
Multivariate Public Key CryptosystemQuadratic RoundsSecurity ImprovementTwo-round SchemePublic Key Cryptography
a heuristic approach to positive root isolation for multiple power sums 期刊论文
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 卷号: 16, 期号: 14, 页码: 1912-1926
作者:  Xu Ming;  Mu Chuandong;  Zeng Zhenbing;  Li Zhi-bin
Adobe PDF(174Kb)  |  收藏  |  浏览/下载:43/0  |  提交时间:2011/05/23
Multiple Power SumsRoot IsolationRoot BoundsDescartes Sign RuleFouriers Theorem
expected values for the rational complexity of finite binary sequences 期刊论文
DESIGNS CODES AND CRYPTOGRAPHY, 2010, 卷号: 55, 期号: 1, 页码: 65-79
作者:  Tian Tian;  Qi Wen-Feng
Adobe PDF(232Kb)  |  收藏  |  浏览/下载:36/0  |  提交时间:2011/05/23
Feedback With Carry Shift Registers2-adic ComplexityRational Complexity
detecting double jpeg compression with the same quantization matrix 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 4, 页码: 848-856
作者:  Huang Fangjun;  Huang Jiwu;  Shi Yun Qing
Adobe PDF(894Kb)  |  收藏  |  浏览/下载:39/0  |  提交时间:2011/05/23
Digital ForensicDouble Joint Photographic Experts Group (Jpeg) CompressionQuantization Matrix
the lu-lc conjecture is false 期刊论文
QUANTUM INFORMATION & COMPUTATION, 2010, 卷号: 10, 期号: 40545, 页码: 97-108
作者:  Ji Zhengfeng;  Chen Jianxin;  Wei Zhaohui;  Ying Mingsheng
Adobe PDF(380Kb)  |  收藏  |  浏览/下载:49/0  |  提交时间:2011/05/23
EntanglementStabilizer StatesGraph StatesLu-lc Conjecture
detection of quantization artifacts and its applications to transform encoder identification 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 4, 页码: 810-815
作者:  Luo Weiqi;  Wang Yuangen;  Huang Jiwu
Adobe PDF(795Kb)  |  收藏  |  浏览/下载:66/0  |  提交时间:2011/05/23
Digital Image ForensicsQuantization ArtifactsSource Encoder Identification
step construction of visual cryptography schemes 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 1, 页码: 27-38
作者:  Liu Feng;  Wu Chuankun;  Lin Xijun
Adobe PDF(450Kb)  |  收藏  |  浏览/下载:46/0  |  提交时间:2011/05/23
Secret SharingStep ConstructionVisual Cryptography
a problem reduction based approach to discrete optimization algorithm design 期刊论文
COMPUTING, 2010, 卷号: 88, 期号: 40545, 页码: 31-54
作者:  Zheng Yujun;  Xue Jinyun
Adobe PDF(312Kb)  |  收藏  |  浏览/下载:51/0  |  提交时间:2011/05/23
Discrete OptimizationProgram CalculationProblem Reduction Graph (Prg)Algorithm Design
on hierarchically developing reactive systems 期刊论文
INFORMATION AND COMPUTATION, 2010, 卷号: 208, 期号: 9, 页码: 997-1019
作者:  Zhan Naijun;  Majster-Cederbaum Mila
Adobe PDF(447Kb)  |  收藏  |  浏览/下载:41/0  |  提交时间:2011/05/24
Action RefinementModal LogicsSpecificationVerificationReactive Systems