Sciweavers

58 search results - page 1 / 12
» How Leaky Is an Extractor
Sort
View
LATINCRYPT
2010
13 years 3 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
TCSV
2008
94views more  TCSV 2008»
13 years 4 months ago
FGS Coding Using Cycle-Based Leaky Prediction Through Multiple Leaky Factors
This paper proposes a fine granularity scalable (FGS) coding using cycle-based leaky prediction, in which the multiple leaky factors are used to yield enhancement layer prediction ...
Xiangyang Ji, Yanyan Zheng, Debin Zhao, Feng Wu, W...
COCO
2006
Springer
100views Algorithms» more  COCO 2006»
13 years 8 months ago
How to Get More Mileage from Randomness Extractors
Let C be a class of distributions over {0, 1}n . A deterministic randomness extractor for C is a function E : {0, 1}n {0, 1}m such that for any X in C the distribution E(X) is sta...
Ronen Shaltiel
ICIP
2002
IEEE
14 years 6 months ago
Robust and efficient scalable video coding with leaky prediction
This paper presents a robust scalable video coding scheme with leaky prediction, suitable for time-varying error-prone channels, such as the Internet or wireless channels. The pro...
Sangeun Han, Bernd Girod
ICC
2007
IEEE
127views Communications» more  ICC 2007»
13 years 11 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...