Sciweavers

1150 search results - page 179 / 230
» Algorithmic transforms for efficient energy scalable computa...
Sort
View
SNPD
2008
15 years 5 months ago
Effect of Security Increment to Symmetric Data Encryption through AES Methodology
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic ...
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad ...
WSCG
2004
149views more  WSCG 2004»
15 years 5 months ago
Shape-Preserving Parametrization of Genus 0 Surfaces
The parametrization of 3-d meshes can be used in many fields of computer graphics. Mesh-texturing, mesh-retriangulation or 3-d morphing are only few applications for which a mesh ...
Hermann Birkholz
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 4 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
CVPR
2009
IEEE
16 years 8 months ago
Distributed Volumetric Scene Geometry Reconstruction With a Network of Distributed Smart Cameras
Central to many problems in scene understanding based on using a network of tens, hundreds or even thousands of randomly distributed cameras with on-board processing and wireless c...
Shubao Liu, Kongbin Kang, Jean-Philippe Tarel and ...
JNSM
2008
130views more  JNSM 2008»
15 years 4 months ago
Declarative Infrastructure Configuration Synthesis and Debugging
There is a large conceptual gap between end-to-end infrastructure requirements and detailed component configuration implementing those requirements. Today, this gap is manually br...
Sanjai Narain, Gary Levin, Sharad Malik, Vikram Ka...