Sciweavers

CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 5 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
ICPR
2002
IEEE
13 years 9 months ago
Hand Pose Recognition Using Curvature Scale Space
In this paper, we present a novel feature extraction approach based on Curvature Scale Space (CSS) for translation, scale, and rotation invariant recognition of hand poses. First,...
Chin-Chen Chang, I-Yen Chen, Yea-Shuan Huang
ADVIS
2004
Springer
13 years 10 months ago
Multiple Sets of Rules for Text Categorization
An important issue in text mining is how to make use of multiple pieces knowledge discovered to improve future decisions. In this paper, we propose a new approach to combining mult...
Yaxin Bi, Terry J. Anderson, Sally I. McClean