Sciweavers

1628 search results - page 107 / 326
» Compiler Construction Using Scheme
Sort
View
PCM
2004
Springer
190views Multimedia» more  PCM 2004»
15 years 7 months ago
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The watermark is embedded in the compressed domain and...
Lijun Wang, Hongxun Yao, Shaohui Liu, Wen Gao
CCS
2003
ACM
15 years 7 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
HEURISTICS
2008
92views more  HEURISTICS 2008»
15 years 2 months ago
Learning heuristics for basic block instruction scheduling
Instruction scheduling is an important step for improving the performance of object code produced by a compiler. A fundamental problem that arises in instruction scheduling is to ...
Abid M. Malik, Tyrel Russell, Michael Chase, Peter...
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
15 years 8 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase
ICIP
2005
IEEE
16 years 4 months ago
Beyond interpolation: optimal reconstruction by quasi-interpolation
We investigate the use of quasi-interpolating approximation schemes, to construct an estimate of an unknown function from its given discrete samples. We show theoretically and wit...
Laurent Condat, Thierry Blu, Michael Unser