Sciweavers

873 search results - page 125 / 175
» E-voting: Dependability Requirements and Design for Dependab...
Sort
View
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
15 years 1 months ago
Cryptanalysis of LASH
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7) ....
Ron Steinfeld, Scott Contini, Krystian Matusiewicz...
DAGSTUHL
2007
15 years 1 months ago
Energy Scalability and the RESUME Scalable Video Codec
In the context of the RESUME-project a scalable wavelet-based video decoder was built to demonstrate the benefits of reconfigurable hardware for scalable applications. Scalable v...
Harald Devos, Hendrik Eeckhaut, Mark Christiaens, ...
UAI
2008
15 years 1 months ago
Toward Experiential Utility Elicitation for Interface Customization
User preferences for automated assistance often vary widely, depending on the situation, and quality or presentation of help. Developing effective models to learn individual prefe...
Bowen Hui, Craig Boutilier
CISST
2003
83views Hardware» more  CISST 2003»
15 years 1 months ago
Computational Efficiency of Structural Image Matching
This paper addresses computational efficiency issues of a new algebraic method for imagery registration/conflation. An algebraic approach to conflation/registration of images does ...
Richard Chase, Boris Kovalerchuk
GRAPHICSINTERFACE
2001
15 years 1 months ago
Novel Solver for Dynamic Surfaces
Physics-based modeling integrates dynamics and geometry. The standard methods to solve the Lagrangian equations use a direct approach in the spatial domain. Though extremely power...
Sumantro Ray, Hong Qin