Sciweavers

224 search results - page 34 / 45
» Secure Computation from Random Error Correcting Codes
Sort
View
DCC
2005
IEEE
14 years 7 months ago
A Block-Based Inter-Band Lossless Hyperspectral Image Compressor
Abstract: We propose a hyperspectral image compressor called BH which considers its input image as being partitioned into square blocks, each lying entirely within a particular ban...
Marko J. Slyz, Lei Zhang
RAID
2010
Springer
13 years 5 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
ARITH
2007
IEEE
14 years 1 months ago
Optimistic Parallelization of Floating-Point Accumulation
Abstract— Floating-point arithmetic is notoriously nonassociative due to the limited precision representation which demands intermediate values be rounded to fit in the availabl...
Nachiket Kapre, André DeHon
TCS
1998
13 years 7 months ago
Merit Factors and Morse Sequences
Abstract. We show that Turyn’s conjecture, arising from the Theory of Error Correcting Codes, has an equivalent formulation in Dynamical Systems Theory. In particular, Turyn’s ...
T. Downarowicz, Y. Lacroix
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 27 days ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay