Sciweavers

23 search results - page 2 / 5
» A Conference Key Distribution Scheme Using Interpolating Pol...
Sort
View
ICIP
2006
IEEE
14 years 7 months ago
Mesh-Based Motion-Compensated Interpolation for Side Information Extraction in Distributed Video Coding
1 This paper addresses the problem of side information generation in distributed video compression (DVC) schemes. Intermediate frames constructed by motioncompensated interpolation...
Denis Kubasov, Christine Guillemot
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 9 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
PPAM
2007
Springer
13 years 11 months ago
A Block-Based Parallel Adaptive Scheme for Solving the 4D Vlasov Equation
We present a parallel algorithm for solving the 4D Vlasov equation. Our algorithm is designed for distributed memory architectures. It uses an adaptive numerical method which reduc...
Olivier Hoenen, Eric Violard
SIAMMAX
2011
157views more  SIAMMAX 2011»
12 years 8 months ago
Deflated Restarting for Matrix Functions
We investigate an acceleration technique for restarted Krylov subspace methods for computing the action of a function of a large sparse matrix on a vector. Its effect is to ultima...
Michael Eiermann, Oliver G. Ernst, Stefan Güt...