Sciweavers

Share
85 search results - page 17 / 17
» dcc 2008
Sort
View
DCC
2008
IEEE
9 years 2 months ago
Compression of Hyperspectral Images with LVQ-SPECK
We discuss the use of lattice vector quantizers in conjunction with a quadtree-based sorting algorithm for the compression of multidimensional data sets, as encountered, for examp...
Alessandro J. S. Dutra, William A. Pearlman, Eduar...
DCC
2008
IEEE
9 years 2 months ago
Word-Based Statistical Compressors as Natural Language Compression Boosters
Semistatic word-based byte-oriented compression codes are known to be attractive alternatives to compress natural language texts. With compression ratios around 30%, they allow di...
Antonio Fariña, Gonzalo Navarro, José...
ICFP
2008
ACM
9 years 3 months ago
AURA: a programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary programming constructs (e.g., integers and recursive functions) and authorization logic co...
Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianz...
CSFW
2008
IEEE
8 years 9 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
IACR
2016
39views Biometrics» more  IACR 2016»
2 years 11 months ago
How to Generalize RSA Cryptanalyses
Recently, the security of RSA variants with moduli N = pr q, e.g., the Takagi RSA and the prime power RSA, have been actively studied in several papers. Due to the unusual composit...
Atsushi Takayasu, Noboru Kunihiro
books