Sciweavers

604 search results - page 11 / 121
» Efficient Computation of Multiplicative Inverses for Cryptog...
Sort
View
SIGGRAPH
1996
ACM
13 years 11 months ago
Efficient Generation of Motion Transitions Using Spacetime Constraints
This paper describesthe application of spacetime constraints to creating transitions between segments of human body motion. The motion transition generation uses a combination of ...
Charles Rose, Brian K. Guenter, Bobby Bodenheimer,...
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 1 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 9 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
IMSCCS
2007
IEEE
14 years 1 months ago
Ensemble Subsurface Modeling Using Grid Computing Technology
Ensemble Kalman Filter (EnKF) uses a randomized ensemble of subsurface models for error and uncertainty estimation. However, the complexity of geological models and the requiremen...
Xin Li, Zhou Lei, Christopher D. White, Gabrielle ...
TSP
2010
13 years 2 months ago
Fast algorithms for the computation of sliding sequency-ordered complex hadamard transform
Fast algorithms for computing the forward and inverse sequency-ordered complex Hadamard transforms (SCHT) in a sliding window are presented. The first algorithm consists of decompo...
Jiasong Wu, Huazhong Shu, Lu Wang, Lotfi Senhadji