Sciweavers

1628 search results - page 108 / 326
» Compiler Construction Using Scheme
Sort
View
ASIACRYPT
1992
Springer
15 years 6 months ago
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai
In [ZMI89,ZMI90] two constructions for a collision resistant hash function were proposed. The first scheme is based on a block cipher, and the second scheme uses modular arithmetic...
Bart Preneel, René Govaerts, Joos Vandewall...
EUROCRYPT
2012
Springer
13 years 4 months ago
Lattice Signatures without Trapdoors
We provide an alternative method for constructing lattice-based digital signatures which does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan (ST...
Vadim Lyubashevsky
ICASSP
2007
IEEE
15 years 8 months ago
An Affine Invariant Function using PCA Bases with an Application to Within-Class Object Recognition
The problem of shape-based recognition of objects under affine transformations is considered. We focus on the construction of a robust and highly discriminative affine invariant...
Georgios Tzimiropoulos, Nikolaos Mitianoudis, Tani...
WACV
2005
IEEE
15 years 8 months ago
Gait Verification Using Probabilistic Methods
In this paper we describe a novel method for gait based identity verification based on Bayesian classification. The verification task is reduced to a two class problem (Client or ...
Alex I. Bazin, Mark S. Nixon
CDC
2008
IEEE
156views Control Systems» more  CDC 2008»
15 years 9 months ago
On-line, kinodynamic trajectory generation through rectangular channels using path and motion primitives
— We present a motion planning scheme for ground vehicles operating in a partially known environment. Kinematic constraints stemming from vehicle dynamics and from the requiremen...
Efstathios Bakolas, Panagiotis Tsiotras