Sciweavers

1369 search results - page 178 / 274
» A Practical Implementation of the Timing Attack
Sort
View
IJNSEC
2010
146views more  IJNSEC 2010»
14 years 6 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
ISCAS
2011
IEEE
288views Hardware» more  ISCAS 2011»
14 years 2 months ago
Complexity-constrained rate-distortion optimization for h.264/avc video coding
In order to enable real-time software-based video encoding, in this work we optimized the prediction stage of an H.264 video encoder, in the complexity sense. Thus, besides lookin...
Tiago A. da Fonseca, Ricardo L. de Queiroz
83
Voted
TCOM
2010
101views more  TCOM 2010»
14 years 5 months ago
Spectral efficient transmit diversity techniques without cyclic prefix for fading relay channels
Abstract--This paper proposes spectral efficient relayassisted transmit diversity techniques, i.e., space-time and space-frequency block codes (STBC/SFBC), for single carrier frequ...
Ui-Kun Kwon, Dae-Young Seol, Gi-Hong Im
PLDI
2006
ACM
15 years 5 months ago
An experimental analysis of self-adjusting computation
Dependence graphs and memoization can be used to efficiently update the output of a program as the input changes dynamically. Recent work has studied techniques for combining the...
Umut A. Acar, Guy E. Blelloch, Matthias Blume, Kan...
HT
2005
ACM
15 years 4 months ago
Advene: active reading through hypervideo
Active reading and hypermedia usage are an integral part of scholar daily practices, but the full exploitation of their potentialities still lies far ahead. In the search for new ...
Olivier Aubert, Yannick Prié