Sciweavers

1917 search results - page 225 / 384
» Compressive Wave Computation
Sort
View
115
Voted
DAC
2009
ACM
16 years 4 months ago
A real-time program trace compressor utilizing double move-to-front method
This paper introduces a new unobtrusive and cost-effective method for the capture and compression of program execution traces in real-time, which is based on a double move-to-fron...
Vladimir Uzelac, Aleksandar Milenkovic
160
Voted
ISPEC
2009
Springer
15 years 10 months ago
Hash-Based Key Management Schemes for MPEG4-FGS
We propose two symmetric-key management schemes for the encryption of scalable compressed video content. The schemes are applicable to MPEG-4 Fine Grain Scalability video coding. O...
Mohamed Karroumi, Ayoub Massoudi
114
Voted
ICICS
2007
Springer
15 years 9 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
104
Voted
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
123
Voted
ICES
1998
Springer
108views Hardware» more  ICES 1998»
15 years 7 months ago
Evolvable Hardware for Space Applications
This paper focuses on characteristics and applications of evolvable hardware (EHW) to space systems. The motivation for looking at EHW originates in the need for more autonomous ad...
Adrian Stoica, Alex S. Fukunaga, Ken Hayworth, Car...