Sciweavers

31324 search results - page 6182 / 6265
» Compare
Sort
View
SOICT
2010
14 years 4 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
SYMMETRY
2010
109views more  SYMMETRY 2010»
14 years 4 months ago
Asymmetry and Symmetry in the Beauty of Human Faces
: The emphasis in the published literature has mostly been on symmetry as the critical source for beauty judgment. In fact, both symmetry and asymmetry serve as highly aesthetic so...
Dahlia W. Zaidel, Marjan Hessamian
TASE
2010
IEEE
14 years 4 months ago
Coverage of a Planar Point Set With Multiple Robots Subject to Geometric Constraints
This paper focuses on the assignment of discrete points among K robots and determining the order in which the points should be processed by the robots, in the presence of geometric...
Nilanjan Chakraborty, Srinivas Akella, John T. Wen
TASLP
2010
133views more  TASLP 2010»
14 years 4 months ago
Unsupervised Equalization of Lombard Effect for Speech Recognition in Noisy Adverse Environments
In the presence of environmental noise, speakers tend to adjust their speech production in an effort to preserve intelligible communication. The noise-induced speech adjustments, c...
Hynek Boril, John H. L. Hansen
TASLP
2010
138views more  TASLP 2010»
14 years 4 months ago
Glimpsing IVA: A Framework for Overcomplete/Complete/Undercomplete Convolutive Source Separation
Abstract--Independent vector analysis (IVA) is a method for separating convolutedly mixed signals that significantly reduces the occurrence of the well-known permutation problem in...
Alireza Masnadi-Shirazi, Wenyi Zhang, Bhaskar D. R...
« Prev « First page 6182 / 6265 Last » Next »