Sciweavers

1268 search results - page 220 / 254
» Direct Translation Model 2
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 11 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
102
Voted
INTERSPEECH
2010
14 years 8 months ago
On the interdependencies between voice quality, glottal gaps, and voice-source related acoustic measures
In human speech production, the voice source contains important non-lexical information, especially relating to a speaker's voice quality. In this study, direct measurements ...
Yen-Liang Shue, Gang Chen, Abeer Alwan
118
Voted
GANDC
2011
105views more  GANDC 2011»
14 years 1 months ago
Adjacent versus coincident representations of geospatial uncertainty: Which promote better decisions?
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Thomas Viard, Guillaume Caumon, Bruno Lévy
193
Voted
TIP
1998
456views more  TIP 1998»
13 years 10 months ago
Snakes, Shapes, and Gradient Vector Flow
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initiali...
Chenyang Xu, Jerry L. Prince
151
Voted
ICIP
2003
IEEE
16 years 3 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo