Sciweavers

339 search results - page 35 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
SSIAI
2002
IEEE
15 years 7 months ago
Feature Extraction from Hyperspectral Images Compressed Using the JPEG-2000 Standard
We present results quantifying the exploitability of compressed remote sensing imagery. The performance of various feature extraction and classification tasks is measured on hype...
Mihaela D. Pal, Christopher M. Brislawn, Steven P....
121
Voted
SIBGRAPI
1999
IEEE
15 years 6 months ago
Parallelizing MPEG Video Encoding using Multiprocessors
Many computer applications are currently using digital video. Recent advances in digital imaging and faster networking infrastructure made this technology very popular, not only fo...
Joao Paulo Kitajima, Denilson Barbosa, Wagner Meir...
109
Voted
CADE
2008
Springer
16 years 2 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
120
Voted
SPIRE
1998
Springer
15 years 6 months ago
Direct Pattern Matching on Compressed Text
We present a fast compression and decompression technique for natural language texts. The novelty is that the exact search can be done on the compressed text directly, using any k...
Edleno Silva de Moura, Gonzalo Navarro, Nivio Zivi...
TDSC
2008
99views more  TDSC 2008»
15 years 2 months ago
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit error is possible (e.g., it is possible to change a bit "0" into a...
Srdjan Capkun, Mario Cagalj, Ram Kumar Rengaswamy,...