Sciweavers

893 search results - page 75 / 179
» Descent Theory for Schemes
Sort
View
TON
2002
81views more  TON 2002»
14 years 11 months ago
Robust rate control for integrated services packet networks
Abstract--Research on congestion-control algorithms has traditionally focused more on performance than on robustness of the closed-loop system to changes in network conditions. As ...
Franco Blanchini, Renato Lo Cigno, Roberto Tempo
CODASPY
2012
13 years 7 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
ICIP
2002
IEEE
16 years 1 months ago
Nonadditive Gaussian watermarking and its application to wavelet-based image watermarking
This paper extends our recent game-theoretic approach [1] to design and embed watermarks in Gaussian signals in the presence of an adversary. The detector solves a binary hypothes...
Pierre Moulin, Aleksandar Ivanovic
DAC
2006
ACM
16 years 26 days ago
Synthesis of synchronous elastic architectures
A simple protocol for latency-insensitive design is presented. The main features of the protocol are the efficient implementation of elastic communication channels and the automat...
Jordi Cortadella, Michael Kishinevsky, Bill Grundm...
60
Voted
SIBGRAPI
2007
IEEE
15 years 6 months ago
Two-stage Binary Image Operator Design: an Approach Based on Interaction Information
We address the problem of binary image operator design over large windows by breaking it into two phases. Firstly, we design several operators over small sub-windows of the main w...
Carlos S. Santos, Nina S. T. Hirata, Roberto Hirat...