Sciweavers

17983 search results - page 3523 / 3597
» Set Types and Applications
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICASSP
2010
IEEE
15 years 2 months ago
Ultrasonic sensing for robust speech recognition
In this paper, we present our work using ultrasonic sensing of speech for digit recognition. First, a set of spectral ultrasonic features are developed and tuned in order to achie...
Sundararajan Srinivasan, Bhiksha Raj, Tony Ezzat
ICASSP
2010
IEEE
15 years 2 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro
150
Voted
EUROPAR
2010
Springer
15 years 2 months ago
Optimized On-Chip-Pipelined Mergesort on the Cell/B.E
Abstract. Limited bandwidth to off-chip main memory is a performance bottleneck in chip multiprocessors for streaming computations, such as Cell/B.E., and this will become even mor...
Rikard Hultén, Christoph W. Kessler, Jö...
ICIP
2007
IEEE
15 years 2 months ago
Information-Based Color Feature Representation for Image Classification
1 For the image classification task, the color histogram is widely used as an important color feature indicating the content of the image. However, the high-resolution color histog...
Shi-Lin Wang, Alan Wee-Chung Liew
« Prev « First page 3523 / 3597 Last » Next »