Sciweavers

4636 search results - page 843 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
ACISP
2008
Springer
15 years 4 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
86
Voted
ICPPW
2007
IEEE
15 years 4 months ago
A Measurement of a large-scale Peer-to-Peer Live Video Streaming System
— Peer-to-Peer (P2P) technologies have found much success in applications like file distributions, and its adoption in live video streaming has recently attracted significant a...
Susu Xie, Gabriel Yik Keung, Bo Li
IPPS
2007
IEEE
15 years 4 months ago
Fast SEU Detection and Correction in LUT Configuration Bits of SRAM-based FPGAs
1 FPGAs are an appealing solution for the space-based remote sensing applications. However, in a low-earth orbit, configuration bits of SRAM-based FPGAs are susceptible to single-e...
Hamid R. Zarandi, Seyed Ghassem Miremadi, Costas A...
CCS
2007
ACM
15 years 4 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
83
Voted
MLDM
2007
Springer
15 years 4 months ago
Selection of Experts for the Design of Multiple Biometric Systems
Abstract. In the biometric field, different experts are combined to improve the system reliability, as in many application the performance attained by individual experts (i.e., d...
Roberto Tronci, Giorgio Giacinto, Fabio Roli