Sciweavers

1336 search results - page 13 / 268
» codes 2005
Sort
View
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
15 years 3 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
ISCAS
2005
IEEE
96views Hardware» more  ISCAS 2005»
15 years 3 months ago
Stereo video coding system with hybrid coding based on joint prediction scheme
— Stereo video systems require double bandwidth and more than twice computational complexity relative to monovideo systems. Thus, An efficient coding scheme is necessary for tra...
Li-Fu Ding, Shao-Yi Chien, Yu-Wen Huang, Yu-Lin Ch...
CSMR
2005
IEEE
15 years 3 months ago
Clustering Data Retrieved from Java Source Code to Support Software Maintenance: A Case Study
Data mining is a technology recently used in support of software maintenance in various contexts. Our works focuses on achieving a high level understanding of Java systems without...
Dimitris Rousidis, Christos Tjortjis
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
15 years 3 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco
ICIP
2005
IEEE
15 years 11 months ago
A new motion compensation approach for error resilient video coding
Mengyao Ma, Oscar C. Au, Shueng-Han Gary Chan