Sciweavers

658 search results - page 109 / 132
» A Content Model for Evaluating Peer-to-Peer Searching Techni...
Sort
View
CN
2006
70views more  CN 2006»
13 years 7 months ago
Small-world characteristics of Internet topologies and implications on multicast scaling
Recent work has shown that the physical connectivity of the Internet exhibits small-world behavior. Characterizing such behavior is important not only for generating realistic Int...
Shudong Jin, Azer Bestavros
ASIACRYPT
2010
Springer
13 years 5 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
CVPR
2008
IEEE
14 years 9 months ago
Pan, zoom, scan - Time-coherent, trained automatic video cropping
We present a method to fully automatically fit videos in 16:9 format on 4:3 screens and vice versa. It can be applied to arbitrary aspect ratios and can be used to make videos sui...
Thomas Deselaers, Philippe Dreuw, Hermann Ney
ICIP
2009
IEEE
14 years 8 months ago
Rate-distortion Optimization For Automatic Sprite Video Coding Using H.264/avc
Sprite-based video coding offers higher compression efficiency than conventional block-based hybrid video coders. In sprite coding a sequence is divided into a model of its backgr...
GRC
2007
IEEE
13 years 7 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough