Sciweavers

872 search results - page 118 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
ICDE
2002
IEEE
116views Database» more  ICDE 2002»
14 years 9 months ago
SCADDAR: An Efficient Randomized Technique to Reorganize Continuous Media Blocks
Scalable storage architectures allow for the addition of disks to increase storage capacity and/or bandwidth. In its general form, disk scaling also refers to disk removals when e...
Ashish Goel, Cyrus Shahabi, Shu-Yuen Didi Yao, Rog...
ICPR
2006
IEEE
14 years 9 months ago
MONNET: Monitoring Pedestrians with a Network of Loosely-Coupled Cameras
MONNET is a visual surveillance system for tracking pedestrians over extended premises. The MONNET system is composed of intelligent nodes, which exchange information on the indiv...
Alexandra Branzan Albu, André Zaccarin, Den...
DAC
2004
ACM
14 years 8 months ago
Automated fixed-point data-type optimization tool for signal processing and communication systems
A tool that automates the floating-point to fixed-point conversion (FFC) process for digital signal processing systems is described. The tool automatically optimizes fixed-point d...
Changchun Shi, Robert W. Brodersen
WWW
2007
ACM
14 years 8 months ago
A mobile application framework for the geospatial web
In this paper we present an application framework that leverages geospatial content on the World Wide Web by enabling innovative modes of interaction and novel types of user inter...
Peter Fröhlich, Rainer Simon
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 8 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg