Sciweavers

21319 search results - page 202 / 4264
» An Approach for Method Reengineering
Sort
View
141
Voted
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
15 years 10 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
153
Voted
NCA
2008
IEEE
15 years 10 months ago
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols
In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the tw...
Marina Gelastou, Chryssis Georgiou, Anna Philippou
125
Voted
ICIP
2007
IEEE
15 years 10 months ago
Radial Basis Functions Collocation Methods for Model Based Level-Set Segmentation
We consider a recent parametric level-set segmentation approach where the implicit interface is the zero level of a continuous function expanded onto compactly supported radial ba...
Amaud Gelas, Joël Schaerer, Olivier Bernard, ...
126
Voted
ISQED
2006
IEEE
136views Hardware» more  ISQED 2006»
15 years 9 months ago
An Improved AMG-based Method for Fast Power Grid Analysis
The continuing VLSI technology scaling leads to increasingly significant power supply fluctuations, which need to be modeled accurately in circuit design and verification. Meanwhi...
Cheng Zhuo, Jiang Hu, Kangsheng Chen
131
Voted
ICMCS
2005
IEEE
120views Multimedia» more  ICMCS 2005»
15 years 9 months ago
KPYR: An Efficient Indexing Method
Motivated by the needs for efficient indexing structures adapted to real applications in video database, we present a new indexing structure named Kpyr. In Kpyr, we use a clusteri...
Thierry Urruty, Fatima Belkouch, Chabane Djeraba