In this paper we consider the problem of image encoding with side information at the decoder, where the side information is an integer shifted version of the image at the encoder....
Marco Dalai, Riccardo Leonardi, Pier Luigi Dragott...
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to existing published FORK-256 cryptanalysis work, yet ...
This paper presents a novel image-based approach to render plausible soft shadows for complex dynamic scenes with rectangular light sources. The algorithm's performance is mo...
In this paper we explore the application of formal elements of games such as goals and scores to information graphics−so called “game-y” information graphics. In order to st...