Sciweavers

151 search results - page 15 / 31
» Optimal (2, n) visual cryptographic schemes
Sort
View
ISCAS
2003
IEEE
103views Hardware» more  ISCAS 2003»
15 years 2 months ago
Low delay rate-control in video transcoding
In order to obtain optimal visual quality while meeting the bit rate requirements, a video transcoder needs efficient rate-control with fine and dynamic adjustments. This paper pr...
Yu Sun, Xiaohui Wei, Ishfaq Ahmad
DCC
2010
IEEE
14 years 7 months ago
Optimization of Overlapped Tiling for Efficient 3D Image Retrieval
Remote visualization of an arbitrary 2-D planar "cut" from a large volumetric dataset with random access has both gained importance and posed significant challenges over...
Zihong Fan, Antonio Ortega
EUROCRYPT
2007
Springer
15 years 3 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
EUROCRYPT
2001
Springer
15 years 2 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
TWC
2010
14 years 4 months ago
Cooperative Decode-and-Forward ARQ Relaying: Performance Analysis and Power Optimization
Abstract--In this paper we develop a new analytical methodology for the evaluation of the outage probability of cooperative decode-and-forward (DF) automatic-repeat-request (ARQ) r...
Sangkook Lee, Weifeng Su, Stella N. Batalama, John...