Sciweavers

13376 search results - page 2273 / 2676
» Problem Solving with
Sort
View
189
Voted
PKC
2011
Springer
197views Cryptology» more  PKC 2011»
14 years 8 months ago
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
We investigate the security of a generalization of HFE (multivariate and odd-characteristic variants). First, we propose an improved version of the basic Kipnis-Shamir key recovery...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
ASAP
2011
IEEE
247views Hardware» more  ASAP 2011»
14 years 5 months ago
High-throughput Contention-Free concurrent interleaver architecture for multi-standard turbo decoder
—To meet the higher data rate requirement of emerging wireless communication technology, numerous parallel turbo decoder architectures have been developed. However, the interleav...
Guohui Wang, Yang Sun, Joseph R. Cavallaro, Yuanbi...
INFOCOM
2012
IEEE
13 years 7 months ago
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones
Abstract—In this paper, we propose to leverage cloud computing to tame resource-poor mobile devices. Specifically, mobile applications can be executed in the mobile device (know...
Yonggang Wen, Weiwen Zhang, Haiyun Luo
RECOMB
2005
Springer
16 years 5 months ago
Recognition of Binding Patterns Common to a Set of Protein Structures
We present a novel computational method, MultiBind, for recognition of binding patterns common to a set of protein structures. It is the first method which performs a multiple alig...
Maxim Shatsky, Alexandra Shulman-Peleg, Ruth Nussi...
CVPR
2009
IEEE
17 years 6 days ago
Global Connectivity Potentials for Random Field Models
Markov random field (MRF, CRF) models are popular in computer vision. However, in order to be computationally tractable they are limited to incorporate only local interactions a...
Sebastian Nowozin, Christoph H. Lampert
« Prev « First page 2273 / 2676 Last » Next »