Sciweavers

2714 search results - page 268 / 543
» Approximation Schemes for Scheduling
Sort
View
ISCAS
2003
IEEE
172views Hardware» more  ISCAS 2003»
15 years 9 months ago
Efficient symbol synchronization techniques using variable FIR or IIR interpolation filters
Maximum Likelihood estimation theory can be used to develop optimal timing recovery schemes for digital communication systems. Tunable digital interpolation filters are commonly ...
Martin Makundi, Timo I. Laakso
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
PC
2008
119views Management» more  PC 2008»
15 years 4 months ago
Atomic wavefunction initialization in ab initio
We present a distributed scheme for initialization from atomic wavefunctions in ab initio molecular dynamics simulations. Good initial guesses for approximate wavefunctions are ve...
Constantine Bekas, Alessandro Curioni, Wanda Andre...
ICIP
2009
IEEE
15 years 2 months ago
New CAVLC design for lossless intra coding
The context-based adaptive variable length coder (CAVLC) in H.264/AVC is not appropriate for lossless video coding because it was designed for lossy video coding. Since statistica...
Jin Heo, Seung Hwan Kim, Yo-Sung Ho
ACNS
2011
Springer
283views Cryptology» more  ACNS 2011»
14 years 8 months ago
On Hiding a Plaintext Length by Preencryption
It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its p...
Cihangir Tezcan, Serge Vaudenay