Sciweavers

95 search results - page 15 / 19
» Data Compression Using Encrypted Text
Sort
View
USS
2010
13 years 4 months ago
Fighting Coercion Attacks in Key Generation using Skin Conductance
Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion a...
Payas Gupta, Debin Gao
SIGIR
2002
ACM
13 years 6 months ago
Unsupervised document classification using sequential information maximization
We present a novel sequential clustering algorithm which is motivated by the Information Bottleneck (IB) method. In contrast to the agglomerative IB algorithm, the new sequential ...
Noam Slonim, Nir Friedman, Naftali Tishby
SIGIR
1999
ACM
13 years 11 months ago
Efficient Distributed Algorithms to Build Inverted Files
We present three distributed algorithms to build global inverted files for very large text collections. The distributed environment we use is a high bandwidth network of workstati...
Berthier A. Ribeiro-Neto, Edleno Silva de Moura, M...
ICIP
2005
IEEE
14 years 8 months ago
Universal image coding using multiscale recurrent patterns and prediction
In this paper we present a new method for image coding that is able to achieve good results over a wide range of image types. This work is based on the Multidimensional Multiscale...
Eduardo A. B. da Silva, Murilo B. de Carvalho, Nun...
ATS
2010
IEEE
239views Hardware» more  ATS 2010»
13 years 1 months ago
Efficient Simulation of Structural Faults for the Reliability Evaluation at System-Level
In recent technology nodes, reliability is considered a part of the standard design flow at all levels of embedded system design. While techniques that use only low-level models at...
Michael A. Kochte, Christian G. Zoellin, Rafal Bar...