Sciweavers

502 search results - page 54 / 101
» Deploying a New Hash Algorithm
Sort
View
DATE
2009
IEEE
125views Hardware» more  DATE 2009»
15 years 6 months ago
Finite precision processing in wireless applications
—Complex signal processing algorithms are often specified in floating point precision. Thus, a type conversion is needed when the targeted platform requires fixed-point precis...
David Novo, Min Li, Bruno Bougard, Liesbet Van der...
APNOMS
2007
Springer
15 years 6 months ago
A Self-managing SIP-Based IP Telephony System Based on a P2P Approach Using Kademlia
Most of Voice over IP(VoIP) systems are deployed using SIP protocol and based in a client-server architecture. A lot of people and companies could be benefited if the system did n...
Felipe de Castro Louback Rocha, Linnyer Beatrys Ru...
ICIP
2010
IEEE
14 years 9 months ago
Snakules: Snakes that seek spicules on mammography
We present a new method called "snakules" for the annotation of spicules on mammography. Snakules employs parametric open-ended snakes that are deployed in a region arou...
Gautam S. Muralidhar, Alan C. Bovik, Mia K. Markey
JOC
2000
181views more  JOC 2000»
14 years 11 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
SPAA
2003
ACM
15 years 5 months ago
Novel architectures for P2P applications: the continuous-discrete approach
We propose a new approach for constructing P2P networks based on a dynamic decomposition of a continuous space into cells corresponding to servers. We demonstrate the power of thi...
Moni Naor, Udi Wieder