Sciweavers

118 search results - page 3 / 24
» Transforming Out Timing Leaks
Sort
View
IJIT
2004
13 years 10 months ago
Enhance Performance of Secure Image Using Wavelet Compression
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication ...
Goh Han Keat, Azman Samsudin, Zurinahni Zainol
IPPS
1996
IEEE
14 years 23 days ago
The Chessboard Distance Transform and the Medial Axis Transform are Interchangeable
The distance transform (DT) and the medial axis transform (MAT) are two image computation tools used to extract the information about the shape and the position of the foreground ...
Yu-Hua Lee, Shi-Jinn Horng
ISCAS
2007
IEEE
202views Hardware» more  ISCAS 2007»
14 years 2 months ago
A VLSI Architecture for a Fast Computation of the 2-D Discrete Wavelet Transform
In this paper, an efficient VLSI architecture for a fast computation of the 2-D discrete wavelet transform (DWT) is proposed. The architecture employing a three-stage cascade in p...
Chengjun Zhang, Chunyan Wang, M. Omair Ahmad
DRM
2006
Springer
14 years 8 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
RTAS
1999
IEEE
14 years 27 days ago
Timing Constraint Remapping to Avoid Time Discontinuities in Distributed Real-Time Systems
In this paper we propose a dynamic constraint transformation technique for ensuring timing requirements in a distributed real-time system possessing periodically synchronized dist...
Minsoo Ryu, Jungkeun Park, Seongsoo Hong