Sciweavers

3145 search results - page 21 / 629
» Key Improvements to XTR
Sort
View
TOG
2012
212views Communications» more  TOG 2012»
13 years 3 days ago
Understanding and improving the realism of image composites
Compositing is one of the most commonly performed operations in computer graphics. A realistic composite requires adjusting the appearance of the foreground and background so that...
Su Xue, Aseem Agarwala, Julie Dorsey, Holly E. Rus...
EUROMICRO
2003
IEEE
15 years 3 months ago
Key Decisions in Strategic New Product Development for Small Software Product Businesses
Small companies in the software product business risk rework and market failure due to shortcomings in integrating a strategic perspective into management of product development. ...
Jarno Vähäniitty
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
ICALP
2005
Springer
15 years 3 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
PODS
1989
ACM
155views Database» more  PODS 1989»
15 years 1 months ago
Fractals for Secondary Key Retrieval
In this paper we propose the use of fractals and especially the Hilbert curve, in order to design good distance-preserving mappings. Such mappings improve the performance of secon...
Christos Faloutsos, Shari Roseman