Sciweavers

1865 search results - page 303 / 373
» Pan-Private Streaming Algorithms
Sort
View
138
Voted
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
15 years 9 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
ICRA
2000
IEEE
144views Robotics» more  ICRA 2000»
15 years 8 months ago
Automatic Identification of Local Geometric Properties During Teleoperation
During teleoperation, a human operator often receives only 2-D visual feedback from the remote environment. While a variety of kinematic sensors exist on the remote manipulator fo...
Thomas Debus, Pierre E. Dupont, Robert D. Howe
128
Voted
VISUALIZATION
2000
IEEE
15 years 8 months ago
A level-set method for flow visualization
In this paper we propose a technique for visualizing steady flow. Using this technique, we first convert the vector field data into a scalar level-set representation. We then a...
Rüdiger Westermann, Christopher Johnson, Thom...
ISCAS
1999
IEEE
114views Hardware» more  ISCAS 1999»
15 years 8 months ago
Multicarrier QAM modulator
A multicarrier QAM modulator for the wideband code division multiple access (WCDMA) basestation has been designed. The multicarrier modulator performs pulse shaping filtering for ...
Jouko Vankka, Marko Kosunen, Kari Halonen
182
Voted
RTAS
1998
IEEE
15 years 8 months ago
End-Host Architecture for QoS-Adaptive Communication
Proliferation of communication-intensive real-time applications with elastic" timeliness constraints, such as streaming stored video, requires a new design for endhost commun...
Tarek F. Abdelzaher, Kang G. Shin