Sciweavers

667 search results - page 5 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ICASSP
2009
IEEE
15 years 4 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
90
Voted
CORR
2011
Springer
178views Education» more  CORR 2011»
14 years 4 months ago
Robust Additively Coupled Games
We determine the robust Nash equilibrium (RNE) for a wide range of problems in communications systems and networks that are faced with uncertainty in their parameters’ values. T...
Saeedeh Parsaeefard, Ahmad R. Sharafat, Mihaela va...
CANS
2011
Springer
254views Cryptology» more  CANS 2011»
13 years 9 months ago
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
Abstract. In this paper we analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving we are able to break 8 rounds of PRINTCip...
Stanislav Bulygin, Johannes Buchmann
ASPDAC
2006
ACM
158views Hardware» more  ASPDAC 2006»
15 years 3 months ago
Analysis of scratch-pad and data-cache performance using statistical methods
— An effectively designed and efficiently used memory hierarchy, composed of scratch-pads or cache, is seen today as the key to obtaining energy and performance gains in data-do...
Javed Absar, Francky Catthoor
59
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Steady-state analysis of the NLMS algorithm with reusing coefficient vector and a method for improving its performance
The reuse of past coefficient vectors of the NLMS for reducing the steady-state MSD in a low signal-to-noise ratio (SNR) was proposed recently. Its convergence analysis has not b...
Seong-Eun Kim, Jae-Woo Lee, Woo-Jin Song