915 resultados para Springer briefs


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Scalable video coding of H.264/AVC standard enables adaptive and flexible delivery for multiple devices and various network conditions. Only a few works have addressed the influence of different scalability parameters (frame rate, spatial resolution, and SNR) on the user perceived quality within a limited scope. In this paper, we have conducted an experiment of subjective quality assessment for video sequences encoded with H.264/SVC to gain a better understanding of the correlation between video content and UPQ at all scalable layers and the impact of rate-distortion method and different scalabilities on bitrate and UPQ. Findings from this experiment will contribute to a user-centered design of adaptive delivery of scalable video stream.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A series of mobile phone prototypes called The Swarm have been developed in response to the user needs identified in a three-year empirical study of young people’s use of mobile phones. The prototypes take cues from user led innovation and provide multiple avatars that allow individuals to define and manage their own virtual identity. This paper briefly maps the evolution of the prototypes and then describes how the pre-defined, color coded avatars in the latest version are being given greater context and personalization through the use of digital images. This not only gives ‘serendipity a nudge’ by allowing groups to come together more easily, it provides contextual information that can reduce gratuitous contact.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Road and highway infrastructure provides the backbone for a nation's economic growth. The versatile dispersion of population in Australia, from sparsely settled communities in remote areas to regenerated inner city suburbs with high density living in metropolitans, calls for continuing development and improvement on roads infrastructure under the current federal government policies and state governments' strategic plans. As road infrastructure projects involve large resources and mechanism, achieving sustainability not only in economic scales but also through environmental and social responsibility becomes a crucial issue. Current efforts are often impeded by different interpretation on sustainability agenda by stakeholders involved in these types of projects. As a result, sustainability deliverables at the project level is not often as transparent and measurable, compared to promises in project briefs and designs. This paper reviews the past studies on sustainable infrastructure construction, focusing on roads and highway projects. Through literature study and consultation with the industry, key sustainability indicators specific to road infrastructure projects have been identified. Based on these findings, this paper introduces an on-going research project aimed at identifying and integrating the different perceptions and priority needs of the stakeholders, and issues that impact on the gap between sustainability foci and its actual realization at project end level. The exploration helps generate an integrated decision-making model for sustainable road infrastructure projects. The research will promote to the industry more systematic and integrated approaches to decision-making on the implementation of sustainability strategies to achieve deliverable goals throughout the development and delivery process of road infrastructure projects in Australia.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.