Sciweavers

268 search results - page 35 / 54
» An Analysis of Bitstate Hashing
Sort
View
CGI
2004
IEEE
14 years 26 days ago
An Adaptive Sampling Method for Layered Depth Image
Sampling issue is an important problem in image based rendering. In this paper, we propose an adaptive sampling method to improve the Layered Depth Image framework. Different from...
Ravinder Namboori, Hung Chuan Teh, Zhiyong Huang
ESA
2006
Springer
134views Algorithms» more  ESA 2006»
14 years 24 days ago
An Improved Construction for Counting Bloom Filters
A counting Bloom filter (CBF) generalizes a Bloom filter data structure so as to allow membership queries on a set that can be changing dynamically via insertions and deletions. As...
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrah...
CN
2006
83views more  CN 2006»
13 years 9 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
IJNSEC
2008
209views more  IJNSEC 2008»
13 years 9 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
JSW
2008
101views more  JSW 2008»
13 years 9 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza