Sciweavers

5 search results - page 1 / 1
» Fast Recursive Formulations for Best-First Search That Allow...
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
13 years 10 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
SIGGRAPH
1996
ACM
13 years 9 months ago
Efficient Generation of Motion Transitions Using Spacetime Constraints
This paper describesthe application of spacetime constraints to creating transitions between segments of human body motion. The motion transition generation uses a combination of ...
Charles Rose, Brian K. Guenter, Bobby Bodenheimer,...
SIGOPSE
1992
ACM
13 years 8 months ago
Names should mean what, not where
Abstract-- This paper describes the design and implementation1 of IRIS: an intentional resource indicator service. IRIS springs from the concept that end-users should not be bogged...
James O'Toole, David K. Gifford
WSC
2004
13 years 6 months ago
A Case Study in Meta-Simulation Design and Performance Analysis for Large-Scale Networks
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...