Sciweavers

9382 search results - page 1759 / 1877
» A Functional Model for Data Analysis
Sort
View
ASIACRYPT
2010
Springer
15 years 2 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
ICUMT
2009
15 years 2 months ago
Two-layer network coordinate system for Internet distance prediction
Network coordinate (NC) system is an efficient and scalable system for Internet distance prediction. In this paper, we propose 3 two-layer NC systems HNPS, HBBS and HIDES derived f...
Chengbo Dong, Guodong Wang, Xuan Zhang, Beixing De...
ICS
2011
Tsinghua U.
14 years 7 months ago
An idiom-finding tool for increasing productivity of accelerators
Suppose one is considering purchase of a computer equipped with accelerators. Or suppose one has access to such a computer and is considering porting code to take advantage of the...
Laura Carrington, Mustafa M. Tikir, Catherine Olsc...
CVPR
2007
IEEE
16 years 6 months ago
Joint Object Segmentation and Behavior Classification in Image Sequences
In this paper, we propose a general framework for fusing bottom-up segmentation with top-down object behavior classification over an image sequence. This approach is beneficial fo...
Laura Gui, Jean-Philippe Thiran, Nikos Paragios
ICIP
2007
IEEE
16 years 6 months ago
Skeleton-Based Tornado Hook Echo Detection
We propose and evaluate a method to identify tornadoes automatically in Doppler radar imagery by detecting hook echoes, which are important signatures of tornadoes, in Doppler rad...
Hongkai Wang, Robert E. Mercer, John L. Barron, Pa...
« Prev « First page 1759 / 1877 Last » Next »