Sciweavers

3735 search results - page 63 / 747
» Order compression schemes
Sort
View
105
Voted
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 1 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
VTC
2007
IEEE
149views Communications» more  VTC 2007»
15 years 6 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...
100
Voted
ICC
2009
IEEE
176views Communications» more  ICC 2009»
15 years 7 months ago
Error Resilient Non-Asymmetric Slepian-Wolf Coding
Abstract—We consider non-asymmetric distributed source coding (DSC) that achieves any point in the Slepian-Wolf (SW) region. We study the error propagation phenomena and propose ...
Cédric Herzet, Velotiaray Toto-Zarasoa, Ali...
DAC
2006
ACM
15 years 6 months ago
High-performance operating system controlled memory compression
This article describes a new software-based on-line memory compression algorithm for embedded systems and presents a method of adaptively managing the uncompressed and compressed ...
Lei Yang, Haris Lekatsas, Robert P. Dick
109
Voted
SPIRE
1998
Springer
15 years 4 months ago
Direct Pattern Matching on Compressed Text
We present a fast compression and decompression technique for natural language texts. The novelty is that the exact search can be done on the compressed text directly, using any k...
Edleno Silva de Moura, Gonzalo Navarro, Nivio Zivi...