Sciweavers

793 search results - page 115 / 159
» Efficient computation of the characteristic polynomial
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICMCS
2008
IEEE
138views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Using H.264 coded block patterns for fast inter-mode selection
The support of variable block-sizes, though significantly improves the compression efficiency, imposes a big computational challenge on an H.264 encoder. In this paper, we present...
Bo-Yuan Chen, Shih-Hsuan Yang
JVA
2006
IEEE
15 years 3 months ago
Dependability in Hybrid Grid Systems: A Virtual Clusters Approach
With the rapid evolution of mobile and ubiquitous computing, small-scale devices like personal digital assistants, smart "converged" phones and laptops now dominate the ...
Stavros Isaiadis, Vladimir Getov
SC
2004
ACM
15 years 3 months ago
Experiences in Design and Implementation of a High Performance Transport Protocol
This paper describes our experiences in the development of the UDP-based Data Transport (UDT) protocol, an application level transport protocol used in distributed data intensive ...
Yunhong Gu, Xinwei Hong, Robert L. Grossman
ICPR
2010
IEEE
15 years 2 months ago
Extracting Captions in Complex Background from Videos
—Captions in videos play a significant role for automatically understanding and indexing video content, since much semantic information is associated with them. This paper presen...
Xiaoqian Liu, Weiqiang Wang