Sciweavers

1414 search results - page 126 / 283
» Cover Time and Broadcast Time
Sort
View
ACMSE
2007
ACM
15 years 2 months ago
Chinese remainder theorem based group key management
In this paper, we present two new centralized group key management protocols based on the Chinese Remainder Theorem (CRT). By shifting more computing load onto the key server we o...
Xinliang Zheng, Chin-Tser Huang, Manton M. Matthew...
IEEEIAS
2007
IEEE
15 years 4 months ago
A Weighted Stego Image Detector for Sequential LSB Replacement
We describe a simple modification of the so-called Weighted Stego Image (WS) steganalysis method, due to Fridrich and Goljan, to detect sequential replacement of least significa...
Andrew D. Ker
100
Voted
RTCSA
2007
IEEE
15 years 4 months ago
Code Size Optimization for Embedded Processors using Commutative Transformations
Code optimization of the offset assignment generated in embedded systems allows for power and space efficient systems. We propose a new heuristic that uses edge classification to ...
Sai Pinnepalli, Jinpyo Hong, J. Ramanujam, Doris L...
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 4 months ago
Plagiarism Detection in arXiv
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
EURODAC
1994
IEEE
118views VHDL» more  EURODAC 1994»
15 years 2 months ago
The semantics of behavioral VHDL '93 descriptions
We present a rigorous but transparent semantic de nition of VHDL'93 covering the complete signal behavior and time model including the various wait statements and signal assi...
Wolfgang Müller 0003, Egon Börger, Uwe G...