Sciweavers

20778 search results - page 3961 / 4156
» Algorithms for Data Migration
Sort
View
ASIACRYPT
2006
Springer
15 years 7 months ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
171
Voted
COMPGEOM
2004
ACM
15 years 7 months ago
Continuous path verification in multi-axis NC-machining
We introduce a new approach to the problem of collision detection between a rotating milling-cutter of an NC-machine and a model of a solid workpiece, as the rotating cutter conti...
Ron Wein, Oleg Ilushin, Gershon Elber, Dan Halperi...
145
Voted
CC
2006
Springer
124views System Software» more  CC 2006»
15 years 7 months ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
133
Voted
CCS
2006
ACM
15 years 7 months ago
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Yigael Berger, Avishai Wool, Arie Yeredor
167
Voted
CLEAR
2006
Springer
145views Biometrics» more  CLEAR 2006»
15 years 7 months ago
A Joint System for Single-Person 2D-Face and 3D-Head Tracking in CHIL Seminars
We present the IBM systems submitted and evaluated within the CLEAR'06 evaluation campaign for the tasks of single person visual 3D tracking (localization) and 2D face trackin...
Gerasimos Potamianos, ZhenQiu Zhang
« Prev « First page 3961 / 4156 Last » Next »