Sciweavers

154 search results - page 11 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
UIST
2010
ACM
14 years 7 months ago
UIMarks: quick graphical interaction with specific targets
This paper reports on the design and evaluation of UIMarks, a system that lets users specify on-screen targets and associated actions by means of a graphical marking language. UIM...
Olivier Chapuis, Nicolas Roussel
DCC
2008
IEEE
15 years 9 months ago
Drift Characterization of Intra Prediction and Quantization in H.264
The combination of intra prediction, transform, and quantization in the H.264/AVC video coding standard offers high compression performance in picture areas where inter prediction...
Athanasios Leontaris, Alexis M. Tourapis
99
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 4 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
CIDM
2007
IEEE
15 years 3 months ago
Analysis of streaming GPS measurements of surface displacement through a web services environment
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
119
Voted
EMSOFT
2010
Springer
14 years 7 months ago
Resource adaptations with servers for hard real-time systems
Many real-time applications are designed to work in different operating modes each characterized by different functionality and resource demands. With each mode change, resource d...
Nikolay Stoimenov, Lothar Thiele, Luca Santinelli,...