Sciweavers

872 search results - page 117 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
USENIX
2003
13 years 9 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
ICDCS
2011
IEEE
12 years 7 months ago
YSmart: Yet Another SQL-to-MapReduce Translator
— MapReduce has become an effective approach to big data analytics in large cluster systems, where SQL-like queries play important roles to interface between users and systems. H...
Rubao Lee, Tian Luo, Yin Huai, Fusheng Wang, Yongq...

Publication
194views
15 years 6 months ago
A Survey of Application Layer Techniques for Adaptive Streaming of Multimedia
The current Internet only supports best-effort traffic. New high-speed technologies such as ATM (asynchronous transfer mode), gigabit Ethernet, fast Ethernet, and frame relay, have...
Bobby Vandalore, Wu-chi Feng, Raj Jain, Sonia Fahm...
CVPR
2008
IEEE
14 years 9 months ago
Finding people in archive films through tracking
The goal of this work is to find all people in archive films. Challenges include low image quality, motion blur, partial occlusion, non-standard poses and crowded scenes. We base ...
Xiaofeng Ren
ICIP
2007
IEEE
14 years 9 months ago
Using H.264/AVC-Intra for Segmentation-Driven Compound Document Coding
In this paper we explore H.264/AVC operating in intraframe mode to compress a mixed image, i.e. composed of text, graphics and pictures. Even though mixed contents (compound) docu...
Alexandre Zaghetto, Ricardo L. de Queiroz