Sciweavers

8636 search results - page 1452 / 1728
» How Developers Copy
Sort
View
ASIACRYPT
2010
Springer
15 years 2 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
AVI
2010
15 years 2 months ago
Seeing the self in the washing machine: the deep affordance of 2.0 philosophy in the household appliance domain
The acceleration of rhythm of everyday life requires efficiency and flexibility in daily routines. The real expectations and needs of people concerning intelligent home devices sh...
Caterina Calefato, Enrico Frumento, Monica Milani,...
BIOSIG
2010
136views Biometrics» more  BIOSIG 2010»
15 years 2 months ago
User Survey on Phone Security and Usage
Abstract: Mobile phones are widely used nowadays and during the last years developed from simple phones to small computers with an increasing number of features. These result in a ...
Frank Breitinger, Claudia Nickel
BMVC
2010
15 years 2 months ago
Toward Robust Action Retrieval in Video
Retrieving human actions from video databases is a paramount but challenging task in computer vision. In this work, we develop such a framework for robustly recognizing human acti...
Samy Bakheet, Ayoub Al-Hamadi, Bernd Michaelis, Us...
CNSM
2010
15 years 2 months ago
Joint analysis of network incidents and intradomain routing changes
Abstract--This paper studies how intradomain routing instability relates to events in network trouble tickets for two networks: a VPN provider and the Internet2 backbone network. O...
Amelie Medem Kuatse, Renata Teixeira, Nick Feamste...
« Prev « First page 1452 / 1728 Last » Next »