Sciweavers

11217 search results - page 2060 / 2244
» Network Coding for Wireless Networks
Sort
View
ICIP
2000
IEEE
16 years 4 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
ICCD
2003
IEEE
147views Hardware» more  ICCD 2003»
15 years 11 months ago
An Efficient VLIW DSP Architecture for Baseband Processing
The VLIW processors with static instruction scheduling and thus deterministic execution times are very suitable for highperformance real-time DSP applications. But the two major w...
Tay-Jyi Lin, Chin-Chi Chang, Chen-Chia Lee, Chein-...
ICCD
2002
IEEE
103views Hardware» more  ICCD 2002»
15 years 11 months ago
A Stream Processor Development Platform
We describe a hardware and software platform for developing streaming applications. Programmers write stream programs in high-level languages, and a set of software tools maps the...
Ben Serebrin, John D. Owens, Chen H. Chen, Stephen...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 11 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 9 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
« Prev « First page 2060 / 2244 Last » Next »