Sciweavers

256 search results - page 7 / 52
» Exchanging messages of different sizes
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
AUIC
2004
IEEE
13 years 11 months ago
Tactons: Structured Tactile Messages for Non-Visual Information Display
Tactile displays are now becoming available in a form that can be easily used in a user interface. This paper describes a new form of tactile output. Tactons, or tactile re struct...
Stephen A. Brewster, Lorna M. Brown
ECCV
2004
Springer
14 years 9 months ago
Separating Transparent Layers through Layer Information Exchange
In this paper we present an approach for separating two transparent layers in images and video sequences. Given two initial unknown physical mixtures, I1 and I2, of real scene laye...
Bernard Sarel, Michal Irani
CDC
2009
IEEE
211views Control Systems» more  CDC 2009»
14 years 3 days ago
An event-triggered distributed primal-dual algorithm for Network Utility maximization
Abstract— Many problems associated with networked systems can be formulated as network utility maximization (NUM) problems. NUM problems maximize a global separable measure of ne...
Pu Wan, Michael D. Lemmon
SSWMC
2004
13 years 8 months ago
Lossless data embedding with file size preservation
In lossless watermarking, it is possible to completely remove the embedding distortion from the watermarked image and recover an exact copy of the original unwatermarked image. Lo...
Jessica J. Fridrich, Miroslav Goljan, Qing Chen, V...