Sciweavers

2449 search results - page 231 / 490
» Tensor Embedding Methods
Sort
View
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 8 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
ECRTS
2004
IEEE
15 years 6 months ago
Optimized Slowdown in Real-Time Task Systems
In [1], Jejurikar and Gupta investigated energy savings due to optimal slowdown of periodic tasks in real-time task systems, where tasks have varying power characteristics and task...
Ravindra Jejurikar, Rajesh K. Gupta
164
Voted
RTCSA
1998
IEEE
15 years 6 months ago
Wait-Free Snapshots in Real-Time Systems: Algorithms and Performance
Snap-shot mechanisms are used to read a globally consistent set of variable values. Such a mechanism can be used to solve a variety of communication and synchronization problems, ...
Andreas Ermedahl, Hans Hansson, Marina Papatrianta...
DCC
2006
IEEE
16 years 2 months ago
Generating More MNT Elliptic Curves
In their seminal paper, Miyaji, Nakabayashi and Takano [12] describe a simple method for the creation of elliptic curves of prime order with embedding degree 3, 4, or 6. Such curve...
Michael Scott, Paulo S. L. M. Barreto
CONCUR
2005
Springer
15 years 8 months ago
Transactions in RCCS
We propose a formalisation of the notion of transaction, using a variant of CCS, RCCS, that distinguishes reversible and irreversible actions, and incorporates a distributed backtr...
Vincent Danos, Jean Krivine