Sciweavers

4498 search results - page 9 / 900
» How to Invent Functions
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
149
Voted
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 9 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
HPCN
1998
Springer
15 years 9 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears