Sciweavers

11217 search results - page 2060 / 2244
» Network Coding for Wireless Networks
Sort
View
106
Voted
ICIP
2000
IEEE
16 years 16 days ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...
ICCD
2003
IEEE
147views Hardware» more  ICCD 2003»
15 years 7 months ago
An Efficient VLIW DSP Architecture for Baseband Processing
The VLIW processors with static instruction scheduling and thus deterministic execution times are very suitable for highperformance real-time DSP applications. But the two major w...
Tay-Jyi Lin, Chin-Chi Chang, Chen-Chia Lee, Chein-...
ICCD
2002
IEEE
103views Hardware» more  ICCD 2002»
15 years 7 months ago
A Stream Processor Development Platform
We describe a hardware and software platform for developing streaming applications. Programmers write stream programs in high-level languages, and a set of software tools maps the...
Ben Serebrin, John D. Owens, Chen H. Chen, Stephen...
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 7 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
« Prev « First page 2060 / 2244 Last » Next »