Sciweavers

2642 search results - page 107 / 529
» The development of Chez Scheme
Sort
View
CRV
2006
IEEE
128views Robotics» more  CRV 2006»
14 years 1 months ago
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption
Conventional image-oriented cryptographic techniques lack the flexibility needed for content-specific security features such as the concealment of confidential information within ...
Alexander Wong, William Bishop
EUROCRYPT
2006
Springer
14 years 1 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton
SC
2000
ACM
14 years 1 months ago
A Unified Algorithm for Load-balancing Adaptive Scientific Simulations
Adaptive scientific simulations require that periodic repartitioning occur dynamically throughout the course of the computation. The repartitionings should be computed so as to mi...
Kirk Schloegel, George Karypis, Vipin Kumar
SMILE
2000
Springer
14 years 1 months ago
Frame Decimation for Structure and Motion
A frame decimation scheme is proposed that makes automatic extraction of Structure and Motion (SaM) from handheld sequences more practical. Decimation of the number of frames used...
David Nistér
SIGCOMM
1991
ACM
14 years 1 months ago
A Control-Theoretic Approach to Flow Control
This paper presents a control-theoretic approach to reactive flow control in networks that do not reserve bandwidth. We assume a round-robin-like queue service discipline in the o...
Srinivasan Keshav