Sciweavers

53 search results - page 5 / 11
» How to Strengthen Pseudo-random Generators by Using Compress...
Sort
View
VISUALIZATION
1999
IEEE
13 years 11 months ago
Progressive Compression of Arbitrary Triangular Meshes
In this paper we present a mesh compression method based on a multiresolution decomposition whose detail coefficients have a compact representation and thus smaller entropy than t...
Daniel Cohen-Or, David Levin, Offir Remez
ICASSP
2010
IEEE
13 years 7 months ago
Anti-forensics of JPEG compression
The widespread availability of photo editing software has made it easy to create visually convincing digital image forgeries. To address this problem, there has been much recent w...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICDM
2005
IEEE
133views Data Mining» more  ICDM 2005»
14 years 1 months ago
Summarization - Compressing Data into an Informative Representation
In this paper, we formulate the problem of summarization of a dataset of transactions with categorical attributes as an optimization problem involving two objective functions - co...
Varun Chandola, Vipin Kumar
ISCC
2008
IEEE
135views Communications» more  ISCC 2008»
14 years 1 months ago
Analysis of compressed depth and image streaming on unreliable networks
This paper explores the issues connected to the transmission of three dimensional scenes over unreliable networks such as the wireless ones. It analyzes the effect of the loss of ...
Pietro Zanuttigh, Andrea Zanella, Guido M. Cortela...
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
14 years 29 days ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen