Sciweavers

1262 search results - page 62 / 253
» Fast Robust Hashing
Sort
View
91
Voted
CCS
2005
ACM
15 years 6 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
IEEEMSP
2002
IEEE
138views Multimedia» more  IEEEMSP 2002»
15 years 5 months ago
A review of algorithms for audio fingerprinting
— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
99
Voted
ICMCS
2006
IEEE
310views Multimedia» more  ICMCS 2006»
15 years 6 months ago
An Optimal and Statistically Robust Correlation Technique for Block Based Motion Estimation
In this paper we propose an optimal and robust correlation technique for the local motion estimation purposes. It is based on the maximization of a statistical robust matching fun...
Fedwa Essannouni, Rachid Oulad Haj Thami, Ahmed Sa...
114
Voted
CDC
2009
IEEE
164views Control Systems» more  CDC 2009»
14 years 10 months ago
Real-time MPC - Stability through robust MPC design
Recent results have suggested that online Model Predictive Control (MPC) can be computed quickly enough to control fast sampled systems. High-speed applications impose a hard real-...
Melanie Nicole Zeilinger, Colin Neil Jones, Davide...
ICDAR
2011
IEEE
14 years 11 days ago
Robust Vanishing Point Detection for MobileCam-Based Documents
—Document images captured by a mobile phone camera often have perspective distortions. In this paper, fast and robust vanishing point detection methods for such perspective docum...
Xu-Cheng Yin, Hong-Wei Hao, Jun Sun 0004, Satoshi ...