Sciweavers

3898 search results - page 340 / 780
» On the Bit Extraction Problem
Sort
View
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 9 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
GLVLSI
2003
IEEE
132views VLSI» more  GLVLSI 2003»
15 years 9 months ago
Power-aware pipelined multiplier design based on 2-dimensional pipeline gating
Power-awareness indicates the scalability of the system energy with changing conditions and quality requirements. Multipliers are essential elements used in DSP applications and c...
Jia Di, Jiann S. Yuan
INFOCOM
2003
IEEE
15 years 9 months ago
An Analytical Study of a Tradeoff Between Transmission Power and FEC for TCP Optimization in Wireless Networks
- It is well known that TCP has performance problems when wireless links are involved in the end-to-end connection. This is due to the high bit error rate characterizing wireless l...
Laura Galluccio, Giacomo Morabito, Sergio Palazzo
SIBGRAPI
2003
IEEE
15 years 9 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
PADS
2003
ACM
15 years 9 months ago
DVS: An Object-Oriented Framework for Distributed Verilog Simulation
There is a wide-spread usage of hardware design languages(HDL) to speed up the time-to-market for the design of modern digital systems. Verification engineers can simulate hardwa...
Lijun Li, Hai Huang, Carl Tropper