Sciweavers

923 search results - page 129 / 185
» Improved Slide Attacks
Sort
View
ISCA
2008
IEEE
150views Hardware» more  ISCA 2008»
15 years 10 months ago
Fetch-Criticality Reduction through Control Independence
Architectures that exploit control independence (CI) promise to remove in-order fetch bottlenecks, like branch mispredicts, instruction-cache misses and fetch unit stalls, from th...
Mayank Agarwal, Nitin Navale, Kshitiz Malik, Matth...
ICIP
2004
IEEE
16 years 5 months ago
Non-uniform quantizer design for image data hiding
Most quantizer based data hiding schemes use uniform quantizer, which is not optimal if the host signal is not uniformly distributed. In this paper, we design a quantizer that is ...
Ning Liu, Koduvayur P. Subbalakshmi
ICIP
2002
IEEE
16 years 5 months ago
Quantized projection data hiding
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
Fernando Pérez-González, Féli...
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
16 years 1 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
PAKDD
2009
ACM
133views Data Mining» more  PAKDD 2009»
15 years 10 months ago
On Link Privacy in Randomizing Social Networks
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu