Sciweavers

3155 search results - page 539 / 631
» Maintenance: Less Is Not More
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
15 years 10 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
ISVC
2009
Springer
15 years 10 months ago
A Novel Method for Enhanced Needle Localization Using Ultrasound-Guidance
Abstract. In this paper, we propose a novel and fast method to localize and track needles during image-guided interventions. Our proposed method is comprised of framework of needle...
Bin Dong, Eric Savitsky, Stanley Osher
IWCIA
2009
Springer
15 years 10 months ago
Signatures of Combinatorial Maps
Abstract. In this paper, we address the problem of computing a canonical representation of an n-dimensional combinatorial map. To do so, we define two combinatorial map signatures...
Stéphane Gosselin, Guillaume Damiand, Chris...
RAID
2009
Springer
15 years 10 months ago
PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime
In this paper, we present an accurate and realtime PE-Miner framework that automatically extracts distinguishing features from portable executables (PE) to detect zero-day (i.e. pr...
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, ...
ASPDAC
2009
ACM
152views Hardware» more  ASPDAC 2009»
15 years 10 months ago
A novel Toffoli network synthesis algorithm for reversible logic
—Reversible logic studies have promising potential on energy lossless circuit design, quantum computation, nanotechnology, etc. Reversible logic features a one-to-one input outpu...
Yexin Zheng, Chao Huang