Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
The deblurring of images corrupted by radial blur is studied. This type of blur appears in images acquired during any camera translation having a substantial component orthogonal ...
Giacomo Boracchi, Alessandro Foi, Vladimir Katkovn...
Design patterns have proven to be a useful means to make the process of designing, developing, and reusing software systems more efficient. In the area of information visualizatio...
Zaixian Xie, Zhenyu Guo, Matthew O. Ward, Elke A. ...
Unlike English, where unfamiliar words can be queried for its meaning by typing out its letters, the analogous operation in Chinese is far from trivial due to the nature of its wr...
We present Tesseract, an experimental system that enables the direct control of a computer network that is under a single administrative domain. Tesseract’s design is based on t...
Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant ...