Sciweavers

3302 search results - page 524 / 661
» Software Is More Than Code
Sort
View
ICIP
2005
IEEE
16 years 6 months ago
Scene analysis for reducing motion JPEG 2000 video surveillance delivery bandwidth and complexity
In this paper, we propose a new object-based video coding/transmission system using the emerging Motion JPEG 2000 standard [1] for the efficient storage and delivery of video surve...
Christophe Parisot, Jérôme Meessen, J...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 5 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
SIGMOD
2007
ACM
179views Database» more  SIGMOD 2007»
16 years 4 months ago
How to barter bits for chronons: compression and bandwidth trade offs for database scans
Two trends are converging to make the CPU cost of a table scan a more important component of database performance. First, table scans are becoming a larger fraction of the query p...
Allison L. Holloway, Vijayshankar Raman, Garret Sw...
PLDI
2010
ACM
16 years 1 months ago
Ur: Statically-Typed Metaprogramming with Type-Level Record Computation
Dependent types provide a strong foundation for specifying and verifying rich properties of programs through type-checking. The earliest implementations combined dependency, which...
Adam Chlipala
SC
2009
ACM
15 years 11 months ago
Enabling high-fidelity neutron transport simulations on petascale architectures
The UNIC code is being developed as part of the DOE’s Nuclear Energy Advanced Modeling and Simulation (NEAMS) program. UNIC is an unstructured, deterministic neutron transport c...
Dinesh K. Kaushik, Micheal Smith, Allan Wollaber, ...