Sciweavers

8825 search results - page 1311 / 1765
» All for one or one for all
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
15 years 8 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
142
Voted
IWCIA
2009
Springer
15 years 8 months ago
Signatures of Combinatorial Maps
Abstract. In this paper, we address the problem of computing a canonical representation of an n-dimensional combinatorial map. To do so, we define two combinatorial map signatures...
Stéphane Gosselin, Guillaume Damiand, Chris...
134
Voted
IWMM
2009
Springer
127views Hardware» more  IWMM 2009»
15 years 8 months ago
Investigating the effects of using different nursery sizing policies on performance
In this paper, we investigate the effects of using three different nursery sizing policies on overall and garbage collection performances. As part of our investigation, we modify ...
Xiaohua Guan, Witawas Srisa-an, ChengHuan Jia
MIRAGE
2009
Springer
15 years 8 months ago
Interpreting Face Images by Fitting a Fast Illumination-Based 3D Active Appearance Model
Abstract. We present a fast and robust iterative method for interpreting face images under non-uniform lighting conditions by using a fitting algorithm which utilizes an illuminat...
Salvador E. Ayala-Raggi, Leopoldo Altamirano Roble...
IMC
2009
ACM
15 years 8 months ago
On calibrating enterprise switch measurements
The complexity of modern enterprise networks is ever-increasing, and our understanding of these important networks is not keeping pace. Our insight into intra-subnet traffic (sta...
Boris Nechaev, Vern Paxson, Mark Allman, Andrei Gu...
« Prev « First page 1311 / 1765 Last » Next »