Current research on music information retrieval and music digital libraries focuses on providing access to huge, public music collections. In this paper we consider a different, b...
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
In order to avoid birthday attacks on message authentication schemes, it has been suggested that one add randomness to the scheme. One must be careful about how randomness is added...
In this paper, we present an evaluation of exaggerated headcoupled camera motions in a game-like 3D object movement. Three exaggeration levels were compared to determine if the ex...
The Temporal Coding Hypothesis of Miller and colleagues [7] suggests that animals integrate related temporal patterns of stimuli into single memory representations. We formalize t...