Sciweavers

648 search results - page 44 / 130
» Authenticated hash tables
Sort
View
3DPVT
2002
IEEE
121views Visualization» more  3DPVT 2002»
14 years 1 months ago
Analysis of Secondary Structure Elements of Proteins Using Indexing Techniques
In this paper we present a method for protein structure comparison that is based on indexing. Unlike most methods using indexing, ours does not use invariants of the C atoms of th...
Concettina Guerra, Stefano Lonardi, Giuseppe Zanot...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 8 months ago
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images
This paper proposes a reversible data hiding method for error diffused halftone images. It employs statistics feature of pixel block patterns to embed data, and utilizes the HVS ch...
Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu
ISCA
1993
IEEE
137views Hardware» more  ISCA 1993»
14 years 28 days ago
Architectural Support for Translation Table Management in Large Address Space Machines
Virtual memoy page translation tables provide mappings from virtual to physical addresses. When the hardware controlled Tratmlation L.ookaside Buffers (TLBs) do not contain a tran...
Jerome C. Huck, Jim Hays
ACSAC
1999
IEEE
14 years 1 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
COMPSAC
2008
IEEE
14 years 3 months ago
Parallel Table Lookup for Next Generation Internet
The rapid growth of Internet population leads to the shortage of IP addresses. The next generation IP protocol, IPv6, which extends the IP address length from 32 bits to 128 bits,...
Li-Che Hung, Yaw-Chung Chen