Sciweavers

1898 search results - page 151 / 380
» Weak Keys for IDEA
Sort
View
ICMCS
2005
IEEE
75views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Separation of Voice and Music by Harmonic Structure Stability Analysis
Separation of voice and music is an interesting but difficult problem. It is useful for many other researches such as audio content analysis. In this paper, the difference betwee...
Yungang Zhang, Changshui Zhang
ISM
2005
IEEE
103views Multimedia» more  ISM 2005»
14 years 2 months ago
Supporting Low-Cost Video-on-Demand in Heterogeneous Peer-to-Peer Networks
We propose a novel low-cost video-on-demand architecture for heterogeneous peer-to-peer networks. The key idea of this architecture is to aggregate peers’ storage and bandwidths...
Xin Liu, Son T. Vuong
PPOPP
2005
ACM
14 years 2 months ago
Revocable locks for non-blocking programming
In this paper we present a new form of revocable lock that streamlines the construction of higher level concurrency abstractions such as atomic multi-word heap updates. The key id...
Tim Harris, Keir Fraser
CC
2005
Springer
106views System Software» more  CC 2005»
14 years 2 months ago
Source-Level Debugging for Multiple Languages with Modest Programming Effort
Abstract. We present techniques that enable source-level debugging for multiple languages at the cost of only modest programming effort. The key idea is to avoid letting debugging ...
Sukyoung Ryu, Norman Ramsey
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
14 years 2 months ago
Hardware Acceleration of the Tate Pairing in Characteristic Three
Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core comp...
Philipp Grabher, Dan Page