Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
An error-correcting code is said to be locally testable if it has an efficient spot-checking procedure that can distinguish codewords from strings that are far from every codeword...
In this paper we propose an algorithm to partition MPEG-4 video objects into temporal segments with uniform activity levels. These segments can be used for efficient summarization...
We study the average-case hardness of the class NP against deterministic polynomial time algorithms. We prove that there exists some constant ? > 0 such that if there is some l...
— A matrix is described that transforms input vectors (blocks) of length (K − 2), consisting of digital PAM vector components, into output vectors (blocks) of length K. The mat...