Sciweavers

5843 search results - page 1020 / 1169
» Software Security in Practice
Sort
View
ACISP
2009
Springer
15 years 11 months ago
Inside the Hypercube
Bernstein’s CubeHash is a hash function family that includes four functions submitted to the NIST Hash Competition. A CubeHash function is parametrized by a number of rounds r, a...
Jean-Philippe Aumasson, Eric Brier, Willi Meier, M...
SOSP
2007
ACM
16 years 1 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
PEPM
2007
ACM
17 years 2 months ago
Concoqtion: Indexed types now!
programming languages community is vigorously pursuing ways to incorporate F!-style indexed types into programming languages. This paper advocates Concoqtion, a practical approach ...
Emir Pasalic, Jeremy G. Siek, Seth Fogarty, Walid ...
CVPR
2004
IEEE
16 years 6 months ago
Detecting and Reading Text in Natural Scenes
This paper gives an algorithm for detecting and reading text in natural images. The algorithm is intended for use by blind and visually impaired subjects walking through city scen...
Xiangrong Chen, Alan L. Yuille
ICIP
2002
IEEE
16 years 6 months ago
A recognition algorithm for Chinese characters in diverse fonts
This paper proposes an algorithm for recognizing Chinese characters in many diverse fonts including Song, Fang, Kai, Hei, Yuan, Lishu, Weibei, and Xingkai. The algorithm is based ...
Xianli Wu, Min Wu
« Prev « First page 1020 / 1169 Last » Next »