Sciweavers

2324 search results - page 75 / 465
» A Fast Keyword-Spotting Technique
Sort
View
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 3 months ago
Badger - A Fast and Provably Secure MAC
We present Badger, a new fast and provably secure MAC based on universal hashing. In the construction, a modified tree hash that is more efficient than standard tree hashing is us...
Martin Boesgaard, Thomas Christensen, Erik Zenner
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
CSDA
2010
119views more  CSDA 2010»
14 years 10 months ago
Fast robust estimation of prediction error based on resampling
Robust estimators of the prediction error of a linear model are proposed. The estimators are based on the resampling techniques cross-validation and bootstrap. The robustness of t...
Jafar A. Khan, Stefan Van Aelst, Ruben H. Zamar
MVA
1998
110views Computer Vision» more  MVA 1998»
14 years 9 months ago
A fast algorithm for detecting die extrusion defects in IC packages
In this paper, we present a fast method for the detection of die extrusion defects in IC packages. The optical and lighting set-up as well as the details of the algorithm used for ...
H. Zhou, Ashraf A. Kassim, S. Ranganath
ICCAD
2006
IEEE
119views Hardware» more  ICCAD 2006»
15 years 6 months ago
FastRoute: a step to integrate global routing into placement
Because of the increasing dominance of interconnect issues in advanced IC technology, placement has become a critical step in the IC design flow. To get accurate interconnect inf...
Min Pan, Chris C. N. Chu