Sciweavers

7106 search results - page 321 / 1422
» Restricted Complexity, General Complexity
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 11 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
GD
2005
Springer
15 years 10 months ago
MultiPlane: A New Framework for Drawing Graphs in Three Dimensions
This paper presents a new framework for drawing graphs in three dimensions. In general, the new framework uses a divide and conquer approach. More specifically, the framework divi...
Seok-Hee Hong
IAT
2003
IEEE
15 years 10 months ago
Assistive Ecologies - Bio-mimetic Design Of Ambient Intelligence
Facing great challenges in designing better assistive technology with ever more complex and pervasive IT systems we need a general change in our understanding of designing IT. Way...
Mikkel Holm Sørensen
ICRA
2003
IEEE
109views Robotics» more  ICRA 2003»
15 years 10 months ago
Narrative situation assessment for human-robot interaction
Abstract— In this paper we address the problem of interpreting sensory data for human-robot interaction, especially when gathered from several robots at the same time. After desc...
Björn Jensen, Roland Philippsen, Roland Siegw...