Sciweavers

5093 search results - page 932 / 1019
» How Real are Real Numbers
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 3 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TWC
2010
13 years 3 months ago
Efficient Measurement Generation and Pervasive Sparsity for Compressive Data Gathering
We proposed compressive data gathering (CDG) that leverages compressive sampling (CS) principle to efficiently reduce communication cost and prolong network lifetime for large scal...
Chong Luo, Feng Wu, Jun Sun, Chang Wen Chen
ASPLOS
2011
ACM
13 years 16 days ago
On-the-fly elimination of dynamic irregularities for GPU computing
The power-efficient massively parallel Graphics Processing Units (GPUs) have become increasingly influential for scientific computing over the past few years. However, their ef...
Eddy Z. Zhang, Yunlian Jiang, Ziyu Guo, Kai Tian, ...
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
13 years 12 days ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 11 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski