Sciweavers

8540 search results - page 1596 / 1708
» The Dynamic Servers Problem
Sort
View
IMA
2007
Springer
97views Cryptology» more  IMA 2007»
15 years 9 months ago
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear appro...
Juan M. Estévez-Tapiador, John A. Clark, Ju...
OOPSLA
2007
Springer
15 years 9 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
VLDB
2007
ACM
124views Database» more  VLDB 2007»
15 years 9 months ago
Ad-hoc Top-k Query Answering for Data Streams
A top-k query retrieves the k highest scoring tuples from a data set with respect to a scoring function defined on the attributes of a tuple. The efficient evaluation of top-k q...
Gautam Das, Dimitrios Gunopulos, Nick Koudas, Niko...
WAPCV
2007
Springer
15 years 9 months ago
A Proto-object Based Visual Attention Model
One of the first steps of any visual system is that of locating suitable interest points, ‘salient regions’, in the scene, to detect events, and eventually to direct gaze towa...
Francesco Orabona, Giorgio Metta, Giulio Sandini
WISTP
2007
Springer
15 years 9 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette
« Prev « First page 1596 / 1708 Last » Next »