Sciweavers

3116 search results - page 285 / 624
» Recovering
Sort
View
CISS
2008
IEEE
15 years 11 months ago
Improved bounds for a deterministic sublinear-time Sparse Fourier Algorithm
—This paper improves on the best-known runtime and measurement bounds for a recently proposed Deterministic sublinear-time Sparse Fourier Transform algorithm (hereafter called DS...
Mark A. Iwen, Craig V. Spencer
SECON
2008
IEEE
15 years 11 months ago
Cooperative Recovery in Heterogeneous Mobile Networks
Abstract—In multicast/broadcast services over infrastructurebased/cellular wireless networks (e.g. 3G cellular networks, WiMax, DVB), data is transmitted to multiple recipients f...
Kaustubh Sinkar, Amit Jagirdar, Thanasis Korakis, ...
CVPR
2007
IEEE
15 years 11 months ago
Dense mirroring surface recovery from 1D homographies and sparse correspondences
In this work we recover the 3D shape of mirroring objects such as mirrors, sunglasses, and stainless steel objects. A computer monitor displays several images of parallel stripes,...
Stas Rozenfeld, Ilan Shimshoni, Michael Lindenbaum
117
Voted
IH
2007
Springer
15 years 10 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
SACRYPT
2007
Springer
15 years 10 months ago
Two Trivial Attacks on Trivium
Trivium is a stream cipher designed in 2005 by C. De Canni`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has ...
Alexander Maximov, Alex Biryukov