Sciweavers

151 search results - page 15 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
ISCAS
2003
IEEE
103views Hardware» more  ISCAS 2003»
14 years 20 days ago
Low delay rate-control in video transcoding
In order to obtain optimal visual quality while meeting the bit rate requirements, a video transcoder needs efficient rate-control with fine and dynamic adjustments. This paper pr...
Yu Sun, Xiaohui Wei, Ishfaq Ahmad
DCC
2010
IEEE
13 years 5 months ago
Optimization of Overlapped Tiling for Efficient 3D Image Retrieval
Remote visualization of an arbitrary 2-D planar "cut" from a large volumetric dataset with random access has both gained importance and posed significant challenges over...
Zihong Fan, Antonio Ortega
EUROCRYPT
2007
Springer
14 years 1 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
EUROCRYPT
2001
Springer
13 years 12 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
TWC
2010
13 years 2 months ago
Cooperative Decode-and-Forward ARQ Relaying: Performance Analysis and Power Optimization
Abstract--In this paper we develop a new analytical methodology for the evaluation of the outage probability of cooperative decode-and-forward (DF) automatic-repeat-request (ARQ) r...
Sangkook Lee, Weifeng Su, Stella N. Batalama, John...