Sciweavers

1379 search results - page 132 / 276
» codes 2009
Sort
View
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
16 years 4 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran
115
Voted
STACS
2009
Springer
15 years 11 months ago
Error-Correcting Data Structures
We study data structures in the presence of adversarial noise. We want to encode a given object in a succinct data structure that enables us to efficiently answer specific queries...
Ronald de Wolf
ICASSP
2009
IEEE
15 years 11 months ago
Distributions of 3D DCT coefficients for video
The three-dimensional discrete cosine transform (3D DCT) has been proposed as an alternative to motion-compensated transform coding for video content. However, so far no definiti...
Malavika Bhaskaranand, Jerry D. Gibson
CISIS
2009
IEEE
15 years 8 months ago
Smews: Smart and Mobile Embedded Web Server
—In this paper, we show that Web protocols and technologies are good candidates to design the Internet of Things, through a user-centric architecture (the user simply has to use ...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
CC
2009
Springer
116views System Software» more  CC 2009»
16 years 4 months ago
A Framework for Exploring Optimization Properties
Important challenges for compiler optimization include determining what optimizations to apply, where to apply them and what is a good sequence in which to apply them. To address t...
Min Zhao, Bruce R. Childers, Mary Lou Soffa