Sciweavers

4498 search results - page 9 / 900
» How to Invent Functions
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 2 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
HPCN
1998
Springer
15 years 2 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears