Sciweavers

7167 search results - page 1351 / 1434
» A Technique for Invariant Generation
Sort
View
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
DSMML
2004
Springer
15 years 3 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
EMSOFT
2004
Springer
15 years 3 months ago
Binary translation to improve energy efficiency through post-pass register re-allocation
Energy efficiency is rapidly becoming a first class optimization parameter for modern systems. Caches are critical to the overall performance and thus, modern processors (both hig...
Kun Zhang, Tao Zhang, Santosh Pande
ICCHP
2004
Springer
15 years 3 months ago
Exploring Scalable Vector Graphics for Visually Impaired Users
Graphical information is very important in common information publishing. For visually impaired users this information is usually not accessible. Scalable Vector Graphics, a recomm...
Martin Rotard, Kerstin Otte, Thomas Ertl
ICCS
2004
Springer
15 years 3 months ago
A Framework for Online Inversion-Based 3D Site Characterization
Our goal is to develop the capability for characterizing the three-dimensional geological structure and mechanical properties of individual sites and complete basins in earthquake-...
Volkan Akcelik, Jacobo Bielak, George Biros, Ioann...
« Prev « First page 1351 / 1434 Last » Next »