Sciweavers

3116 search results - page 288 / 624
» Recovering
Sort
View
ASIACRYPT
2005
Springer
15 years 10 months ago
A Practical Attack on the Fixed RC4 in the WEP Mode
In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also kno...
Itsik Mantin
122
Voted
FPGA
2005
ACM
97views FPGA» more  FPGA 2005»
15 years 10 months ago
Techniques for synthesizing binaries to an advanced register/memory structure
Recent works demonstrate several benefits of synthesizing software binaries onto FPGA hardware, including incorporating hardware design into established software tool flows with m...
Greg Stitt, Zhi Guo, Walid A. Najjar, Frank Vahid
CPM
2004
Springer
145views Combinatorics» more  CPM 2004»
15 years 10 months ago
Computational Problems in Perfect Phylogeny Haplotyping: Xor-Genotypes and Tag SNPs
The perfect phylogeny model for haplotype evolution has been successfully applied to haplotype resolution from genotype data. In this study we explore the application of the perfe...
Tamar Barzuza, Jacques S. Beckmann, Ron Shamir, It...
ECCV
2004
Springer
15 years 10 months ago
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonics
Abstract. We propose a new method for face recognition under arbitrary pose and illumination conditions, which requires only one training image per subject. Furthermore, no limitat...
Lei Zhang 0002, Dimitris Samaras
HLK
2003
IEEE
15 years 9 months ago
Bayesian Reconstruction of 3D Shapes and Scenes From A Single Image
It’s common experience for human vision to perceive full 3D shape and scene from a single 2D image with the occluded parts “filled-in” by prior visual knowledge. In this pa...
Feng Han, Song Chun Zhu