Sciweavers

687 search results - page 89 / 138
» Accessibility Transformation Gateway
Sort
View
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
14 years 11 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
MVA
1992
170views Computer Vision» more  MVA 1992»
14 years 11 months ago
An Host-Target Environment for Real Time Image Processing
The development of a real time image processing on a specific architecture is always restricting for the user who must master all the elementary mechanisms of the machine. Such sp...
M. Pizzocaro
MVA
1992
143views Computer Vision» more  MVA 1992»
14 years 11 months ago
A Real-Time Vision System Using Integrated Memory Array Processor Prototype LSI
This study reports on the performance of a Real-Time Vision System (RVS) and its use of an IMAP prototype LSI. This LSI integrates eight 8 bit processors and a 144 Kbit SRAM on a ...
Yoshihiro Fujita, Nobuyuki Yamashita, Shin'ichiro ...
DKE
2006
138views more  DKE 2006»
14 years 10 months ago
Using the uni-level description (ULD) to support data-model interoperability
We describe a framework called the Uni-Level Description (ULD) for accurately representing information from a broad range of data models. The ULD extends previous metadata-model a...
Shawn Bowers, Lois M. L. Delcambre
IPM
2008
133views more  IPM 2008»
14 years 10 months ago
Hierarchical summarization for delivering information to mobile devices
Access to information via handheld devices supports decision making away from one's computer. However, limitations include small screens and constrained wireless bandwidth. W...
Jahna Otterbacher, Dragomir R. Radev, Omer Kareem