Sciweavers

27 search results - page 5 / 6
» Parallel-Array Implementations of a Non-Restoring Square Roo...
Sort
View
GIS
1998
ACM
13 years 5 months ago
Accuracy of Local Topographic Variables Derived from Digital Elevation Models
We study the accuracy of data on some local topographic attributes derived from digital elevation models (DEMs). First, we carry out a test for the precision of four methods for ca...
Igor v. Florinsky
EUROCRYPT
2006
Springer
13 years 9 months ago
VSH, an Efficient and Provable Collision-Resistant Hash Function
Abstract. We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant assuming the hardness of finding nontrivial modular square roots of ver...
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
TASLP
2002
67views more  TASLP 2002»
13 years 5 months ago
Efficient tracking of the cross-correlation coefficient
In many (audio) processing algorithms, involving manipulation of discrete-time signals, the performance can vary strongly over the repertoire that is used. This may be the case whe...
Ronald M. Aarts, Roy Irwan, Augustus J. E. M. Jans...
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
MIDDLEWARE
2005
Springer
13 years 11 months ago
An Optimal Overlay Topology for Routing Peer-to-Peer Searches
Unstructured peer-to-peer networks are frequently used as the overlay in various middleware toolkits for emerging applications, from content discovery to query result caching to di...
Brian F. Cooper