Sciweavers

793 search results - page 115 / 159
» Efficient computation of the characteristic polynomial
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICMCS
2008
IEEE
138views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Using H.264 coded block patterns for fast inter-mode selection
The support of variable block-sizes, though significantly improves the compression efficiency, imposes a big computational challenge on an H.264 encoder. In this paper, we present...
Bo-Yuan Chen, Shih-Hsuan Yang
JVA
2006
IEEE
14 years 2 months ago
Dependability in Hybrid Grid Systems: A Virtual Clusters Approach
With the rapid evolution of mobile and ubiquitous computing, small-scale devices like personal digital assistants, smart "converged" phones and laptops now dominate the ...
Stavros Isaiadis, Vladimir Getov
SC
2004
ACM
14 years 2 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
ICPR
2010
IEEE
14 years 1 months ago
Extracting Captions in Complex Background from Videos
—Captions in videos play a significant role for automatically understanding and indexing video content, since much semantic information is associated with them. This paper presen...
Xiaoqian Liu, Weiqiang Wang