Sciweavers

3533 search results - page 706 / 707
» Information theory and Thermodynamics
Sort
View
ICCV
2011
IEEE
12 years 5 months ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
ASIACRYPT
2011
Springer
12 years 5 months ago
Leakage-Resilient Cryptography from the Inner-Product Extractor
We present a generic method to secure various widely-used cryptosystems against arbitrary side-channel leakage, as long as the leakage adheres three restrictions: first, it is bou...
Stefan Dziembowski, Sebastian Faust
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 5 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
DAC
2011
ACM
12 years 5 months ago
Supervised design space exploration by compositional approximation of Pareto sets
Technology scaling allows the integration of billions of transistors on the same die but CAD tools struggle in keeping up with the increasing design complexity. Design productivit...
Hung-Yi Liu, Ilias Diakonikolas, Michele Petracca,...
SCHULE
2007
Springer
13 years 12 months ago
Lesen im Informatikunterricht
: Dass im Informatikunterricht Programme geschrieben werden, ist nicht ungewöhnlich. Ebenso werden Programme entworfen, getestet, analysiert und manchmal auch verändert und erwei...
Carsten Schulte