Sciweavers

15 search results - page 2 / 3
» Efficient unknown blocking using LFSR reseeding
Sort
View
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 3 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...
EUROCRYPT
2000
Springer
13 years 9 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
TIP
2010
90views more  TIP 2010»
13 years 4 days ago
Fast Query for Exemplar-Based Image Completion
In this paper, we present a fast algorithm for filling unknown regions in an image using the strategy of exemplarmatching. Unlike the original exemplar-based method using exhaustiv...
Tsz-Ho Kwok, Hoi Sheung, Charlie C. L. Wang
TIT
2002
101views more  TIT 2002»
13 years 5 months ago
Spectrally efficient noncoherent communication
This paper considers noncoherent communication over a frequency-nonselective channel in which the time-varying channel gain is unknown a priori, but is approximately constant over ...
Dilip Warrier, Upamanyu Madhow
TVCG
2010
165views more  TVCG 2010»
13 years 3 days ago
Binary Mesh Partitioning for Cache-Efficient Visualization
Abstract--One important bottleneck when visualizing large data sets is the data transfer between processor and memory. Cacheaware (CA) and cache-oblivious (CO) algorithms take into...
Marc Tchiboukdjian, Vincent Danjean, Bruno Raffin