Sciweavers

951 search results - page 58 / 191
» Suggestions for OWL 3
Sort
View
ISMIR
2004
Springer
104views Music» more  ISMIR 2004»
15 years 3 months ago
Organizing digital music for use: an examination of personal music collections
Current research on music information retrieval and music digital libraries focuses on providing access to huge, public music collections. In this paper we consider a different, b...
Steve Jones, Sally Jo Cunningham, Matt Jones
PPPJ
2003
ACM
15 years 3 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
CRYPTO
2000
Springer
120views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
L-collision Attacks against Randomized MACs
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added...
Michael Semanko
FPLAY
2008
14 years 11 months ago
Exaggerated head motions for game viewpoint control
In this paper, we present an evaluation of exaggerated headcoupled camera motions in a game-like 3D object movement. Three exaggeration levels were compared to determine if the ex...
Robert J. Teather, Wolfgang Stürzlinger
NIPS
2001
14 years 11 months ago
Modeling Temporal Structure in Classical Conditioning
The Temporal Coding Hypothesis of Miller and colleagues [7] suggests that animals integrate related temporal patterns of stimuli into single memory representations. We formalize t...
Aaron C. Courville, David S. Touretzky