Sciweavers

2165 search results - page 114 / 433
» cases 2005
Sort
View
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 9 months ago
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices
Abstract Secure video communication on mobile handheld devices is challenging mainly due to (a) the significant computational needs of both video coding and encryption algorithms ...
Kyoungwoo Lee, Nikil Dutt, Nalini Venkatasubramani...
ACNS
2005
Springer
84views Cryptology» more  ACNS 2005»
15 years 9 months ago
Non-interactive Zero-Knowledge Arguments for Voting
Abstract. In voting based on homomorphic threshold encryption, the voter encrypts his vote and sends it in to the authorities that tally the votes. If voters can send in arbitrary ...
Jens Groth
160
Voted
CASES
2005
ACM
15 years 5 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
COCO
2005
Springer
89views Algorithms» more  COCO 2005»
15 years 9 months ago
Hardness of Max 3SAT with No Mixed Clauses
We study the complexity of approximating Max NME3SAT, a variant of Max 3SAT when the instances are guaranteed to not have any mixed clauses, i.e., every clause has either all its ...
Venkatesan Guruswami, Subhash Khot
ICML
2005
IEEE
16 years 4 months ago
Healing the relevance vector machine through augmentation
The Relevance Vector Machine (RVM) is a sparse approximate Bayesian kernel method. It provides full predictive distributions for test cases. However, the predictive uncertainties ...
Carl Edward Rasmussen, Joaquin Quiñonero Ca...