Sciweavers

24132 search results - page 4794 / 4827
» and 2009
Sort
View
ICIP
2009
IEEE
14 years 7 months ago
Wyner-Ziv to H.264 video transcoder
-- This paper proposes a Wyner-Ziv / H.264 transcoder that enables low cost video applications. The proposed solution supports video encoding on resource constrained devices such a...
José Luis Martínez, Hari Kalva, Gera...
ICIP
2009
IEEE
14 years 7 months ago
Selecting representative and distinctive descriptors for efficient landmark recognition
To have a robust and informative image content representation for image categorization, we often need to extract as many as possible visual features at various locations, scales a...
Sheng Gao, Joo-Hwee Lim
ICIP
2009
IEEE
14 years 7 months ago
Real-time optimal-memory image rotation for embedded systems
Skew-corrected document images are necessary for subsequent downstream operations such as archiving, printing or improving OCR performance. Image rotation is a necessary and more ...
Serene Banerjee, Anjaneyulu Kuchibhotla
ICISC
2009
169views Cryptology» more  ICISC 2009»
14 years 7 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
86
Voted
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 7 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
« Prev « First page 4794 / 4827 Last » Next »