This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Overlapping communication with computation is an important optimization on current cluster architectures; its importance is likely to increase as the doubling of processing power ...
Wei-Yu Chen, Dan Bonachea, Costin Iancu, Katherine...
Multithreaded architectures context switch between instruction streams to hide memory access latency. Although this improves processor utilization, it can increase cache interfere...
Recent advancements in video and audio codec technologies (e.g., RealVideo [18]) make multimedia streaming possible across a wide range of network conditions. With an increasing t...
Zhuoqing Morley Mao, Hoi-sheung Wilson So, Byungho...