Sciweavers

217 search results - page 12 / 44
» Selecting Cryptographic Key Sizes
Sort
View
MCS
2007
Springer
14 years 2 months ago
A New HMM-Based Ensemble Generation Method for Numeral Recognition
A new scheme for the optimization of codebook sizes for HMMs and the generation of HMM ensembles is proposed in this paper. In a discrete HMM, the vector quantization procedure and...
Albert Hung-Ren Ko, Robert Sabourin, Alceu de Souz...
EUROCRYPT
2004
Springer
13 years 11 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
14 years 27 days ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
EUROIMSA
2006
116views Multimedia» more  EUROIMSA 2006»
13 years 9 months ago
Guidelines for Selecting Practical MPEG Group of Pictures
The repeated pattern of I, P and B frames in an MPEG stream is known as the Group of Pictures (GOP). Current GOP choices are made using intuition and informal guidelines without t...
Huahui Wu, Mark Claypool, Robert E. Kinicki
MICRO
1998
IEEE
98views Hardware» more  MICRO 1998»
14 years 6 days ago
Task Selection for a Multiscalar Processor
The Multiscalar architecture advocates a distributed processor organization and task-level speculation to exploit high degrees of instruction level parallelism (ILP) in sequential...
T. N. Vijaykumar, Gurindar S. Sohi