Sciweavers

7326 search results - page 1392 / 1466
» Methods for modalities 3
Sort
View
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
ECCV
2004
Springer
15 years 9 months ago
Statistical Learning of Evaluation Function for ASM/AAM Image Alignment
Alignment between the input and target objects has great impact on the performance of image analysis and recognition system, such as those for medical image and face recognition. A...
Xiangsheng Huang, Stan Z. Li, Yangsheng Wang
ECCV
2004
Springer
15 years 9 months ago
Biometric Sensor Interoperability: A Case Study in Fingerprints
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Arun Ross, Anil K. Jain
EMSOFT
2004
Springer
15 years 9 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
EMSOFT
2004
Springer
15 years 9 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
« Prev « First page 1392 / 1466 Last » Next »