Sciweavers

224 search results - page 34 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
90
Voted
DCC
2005
IEEE
16 years 2 months ago
A Block-Based Inter-Band Lossless Hyperspectral Image Compressor
Abstract: We propose a hyperspectral image compressor called BH which considers its input image as being partitioned into square blocks, each lying entirely within a particular ban...
Marko J. Slyz, Lei Zhang
127
Voted
RAID
2010
Springer
15 years 1 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
118
Voted
ARITH
2007
IEEE
15 years 9 months ago
Optimistic Parallelization of Floating-Point Accumulation
Abstract— Floating-point arithmetic is notoriously nonassociative due to the limited precision representation which demands intermediate values be rounded to fit in the availabl...
Nachiket Kapre, André DeHon
112
Voted
TCS
1998
15 years 2 months ago
Merit Factors and Morse Sequences
Abstract. We show that Turyn’s conjecture, arising from the Theory of Error Correcting Codes, has an equivalent formulation in Dynamical Systems Theory. In particular, Turyn’s ...
T. Downarowicz, Y. Lacroix
165
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 8 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay