Sciweavers

780 search results - page 97 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
14 years 9 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
ICASSP
2009
IEEE
14 years 2 months ago
Jointly optimized mode decisions in redundant video streaming
This paper revisits the problem of source-channel coding for error-resilient video streaming, using redundant encoding. We propose a new method to jointly optimize the macroblock ...
J. Christian Schmidt, Kenneth Rose
ICPR
2008
IEEE
14 years 2 months ago
Combining hierarchical clusterings using min-transitive closure
In the past, clusterings combination approaches are based on “flat” clustering algorithms, i.e. algorithms that operate on non-hierarchical clustering schemes. These approache...
Abdolreza Mirzaei, Mohammad Rahmati
ACSD
2005
IEEE
66views Hardware» more  ACSD 2005»
14 years 1 months ago
Gaining Predictability and Noise Immunity in Global Interconnects
We present a bundled data communication scheme that is robust to crosstalk effects, and to manufacturing and environmental variations. Unlike a data bus, where each receiver alway...
Yinghua Li, Alex Kondratyev, Robert K. Brayton
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
14 years 1 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud