Sciweavers

18 search results - page 3 / 4
» Bidirectional Delta Files
Sort
View
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
13 years 8 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
13 years 10 months ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup
ICASSP
2008
IEEE
14 years 28 days ago
Efficient 4D motion compensated lossless compression of dynamic volumetric medical image data
Dynamic volumetric (four dimensional- 4D) medical images are typically huge in file size and require a vast amount of resources for storage and transmission purposes. In this pape...
Victor Sanchez, Panos Nasiopoulos, Rafeef Abugharb...
EH
2004
IEEE
131views Hardware» more  EH 2004»
13 years 10 months ago
Swarm Intelligence for Digital Circuits Implementation on Field Programmable Gate Arrays Platforms
Field programmable gate arrays (FPGAs) are becoming increasingly important implementation platforms for digital circuits. One of the necessary requirements to effectively utilize ...
Ganesh K. Venayagamoorthy, Venu G. Gudise
WWW
2005
ACM
14 years 7 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel