Sciweavers

3116 search results - page 183 / 624
» Recovering
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ICIAP
2009
ACM
15 years 11 months ago
Hallucinating Faces: Global Linear Modal Based Super-Resolution and Position Based Residue Compensation
A learning-based face hallucination method is proposed in this paper for the reconstruction of a high-resolution face image from a low-resolution observation based on a set of high...
Xiang Ma, Junping Zhang, Chun Qi
RECOMB
2009
Springer
15 years 11 months ago
Phylogenies without Branch Bounds: Contracting the Short, Pruning the Deep
Abstract Constantinos Daskalakis1 , Elchanan Mossel2, , and Sebastien Roch1 1 Microsoft Research 2 UC Berkeley and Weizman Institute We introduce a new phylogenetic reconstruction ...
Constantinos Daskalakis, Elchanan Mossel, Sé...
143
Voted
STACS
2009
Springer
15 years 11 months ago
Locally Decodable Quantum Codes
We study a quantum analogue of locally decodable error-correcting codes. A q-query locally decodable quantum code encodes n classical bits in an m-qubit state, in such a way that ...
Jop Briet, Ronald de Wolf
122
Voted
CONIELECOMP
2009
IEEE
15 years 11 months ago
A Power-Line Communication Modem Based on OFDM
In this paper, we present the design and implementation of a PLC (Power-Line Communication) Modem based on Orthogonal Frequency Division Multiplexing (OFDM). The PLC device implem...
H. A. Garcia-Baleon, Vicente Alarcón Aquino