We are building an operating system in which an integral run-time code generator constantly strives to improve the quality of already executing code. Our system is based on a plat...
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
This paper intends to study the characteristics of VBR MPEG sources and performs models for their traffic behaviour. Our analysis focuses on long-time MPEG video films, approximat...
Anastasios D. Doulamis, Nikolaos D. Doulamis, Geor...
This is a contribution for very low bit rate video coding in real-time and software only on computers of PC class. It is based on frame replenishment with block coding using mean-...
A new method termed the vertex representation is presented for approximating the shapes of objects of arbitrary dimensionality d (e.g., 20, 30, etc.) with orthogonal (d - 1)-dimen...