The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
This paper presents a new stochastic approach which can be applied with di erent watermark techniques. The approach is based on the computation of a Noise Visibility Function NVF...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Naz...
We present a new matrix formulation of the face hypercube embedding problem that motivates the design of an efficient search strategy to find an encoding that satisfies all fac...
Evguenii I. Goldberg, Tiziano Villa, Robert K. Bra...
Due to the increasing demands on efficiency, performance and flexibility reconfigurable computational architectures are very promising candidates in embedded systems design. Recent...
The image of a license plate is scanned by the camera attached to a mobile PDA device and the numbers on the plate are detected by the image processing parts in the proposed Mobile...
Jin-Suk Kang, Taikyeong T. Jeong, Sang Hyun Oh, Me...