Sciweavers

837 search results - page 78 / 168
» codes 2000
Sort
View
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
ICASSP
2011
IEEE
13 years 1 months ago
Image compression using learned dictionaries by RLS-DLA and compared with K-SVD
The recently presented recursive least squares dictionary learning algorithm (RLS-DLA) is tested in a general image compression application. Dictionaries are learned in the pixel ...
Karl Skretting, Kjersti Engan
FMCAD
2000
Springer
14 years 1 months ago
Do You Trust Your Model Checker?
Abstract. In this paper we describe the formal specification and verification of the efficient algorithm for real-time model checking implemented in the model checker RAVEN. It was...
Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn...
VIP
2003
13 years 11 months ago
Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression
Hospital and clinical environments are moving towards computerisation, digitisation and centralisation, resulting in prohibitive amounts of digital medical image data. Compression...
Xin Bai 0002, Jesse S. Jin, David Dagan Feng
CGO
2005
IEEE
14 years 3 months ago
Automatic Generation of High-Performance Trace Compressors
Program execution traces are frequently used in industry and academia. Yet, most trace-compression algorithms have to be re-implemented every time the trace format is changed, whi...
Martin Burtscher, Nana B. Sam