Sciweavers

3735 search results - page 20 / 747
» Order compression schemes
Sort
View
102
Voted
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 4 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
PPOPP
2003
ACM
15 years 5 months ago
Compactly representing parallel program executions
Collecting a program’s execution profile is important for many reasons: code optimization, memory layout, program debugging and program comprehension. Path based execution pro...
Ankit Goel, Abhik Roychoudhury, Tulika Mitra
ICIP
2001
IEEE
16 years 1 months ago
Progressive fractal coding
Progressive coding is an important feature of compression schemes. Wavelet coders are well suited for this purpose because the wavelet coefficients can be naturally ordered accord...
Iv An Kopilovic, Dietmar Saupe, Raouf Hamzaoui
CORR
2010
Springer
90views Education» more  CORR 2010»
15 years 14 days ago
On the Optimality of Successive Decoding in Compress-and-Forward Relay Schemes
In the classical compress-and-forward relay scheme developed by (Cover and El Gamal, 1979), the decoding process operates in a successive way: the destination first decodes the co...
Xiugang Wu, Liang-Liang Xie
ICASSP
2009
IEEE
15 years 7 months ago
Multiterminal source coding of Bernoulli-Gaussian correlated sources
This paper presents a practical coding scheme for the direct symmetric multiterminal source coding problem with remote source, when the noise between the remote source and the obs...
Francesca Bassi, Michel Kieffer, Çagatay Di...