Sciweavers

835 search results - page 142 / 167
» Adaptive Bound Optimization for Online Convex Optimization
Sort
View
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 7 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 5 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
COCOON
2007
Springer
14 years 4 months ago
Priority Algorithms for the Subset-Sum Problem
Greedy algorithms are simple, but their relative power is not well understood. The priority framework [5] captures a key notion of “greediness” in the sense that it processes (...
Yuli Ye, Allan Borodin
DSN
2004
IEEE
14 years 2 months ago
A Framework for Dynamic Byzantine Storage
We present a framework for transforming several quorum-based protocols so that they can dynamically adapt their failure threshold and server count, allowing them to be reconfigure...
Jean-Philippe Martin, Lorenzo Alvisi
TVCG
1998
102views more  TVCG 1998»
13 years 10 months ago
Ray-Tracing Triangular Trimmed Free-Form Surfaces
This paper presents a new approach to rendering triangular algebraic free form surfaces. A hierarchical subdivision of the surface with associated tight bounding volumes provides ...
Wolfgang Stürzlinger