Sciweavers

1127 search results - page 41 / 226
» Value Compression for Efficient Computation
Sort
View
IPL
2010
107views more  IPL 2010»
14 years 8 months ago
Collisions for variants of the BLAKE hash function
In this paper we present an attack to the BLOKE and BRAKE hash functions, which are weakened versions of the SHA-3 candidate BLAKE. In difference to BLAKE, the BLOKE hash functio...
Janos Vidali, Peter Nose, Enes Pasalic
CORR
2012
Springer
220views Education» more  CORR 2012»
13 years 5 months ago
A Bijective String Sorting Transform
Given a string of characters, the Burrows-Wheeler Transform rearranges the characters in it so as to produce another string of the same length which is more amenable to compressio...
Joseph Yossi Gil, David Allen Scott
80
Voted
ICIP
1997
IEEE
15 years 11 months ago
A Multi-Threshold Wavelet Coder ( MTWC ) For High Fidelity Image Compression
An embedded wavelet coder algorithm which adopts different threshold values in different subbands is proposed in this work. The new image coder, called the multi-threshold wavelet...
H.-J. Wang, C.-C. Kuo
DCC
2003
IEEE
15 years 9 months ago
Compression-Domain Editing of 3D Models
3D models have become an essential element of multimedia applications because they provide visual effects that permit interactive exploration. As in other media types, efficient c...
Tulika Mitra, Tzi-cker Chiueh
OPODIS
2010
14 years 7 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal