Sciweavers

1737 search results - page 170 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
110
Voted
DATE
2007
IEEE
74views Hardware» more  DATE 2007»
15 years 11 months ago
Joint consideration of fault-tolerance, energy-efficiency and performance in on-chip networks
High reliability against noise, low energy consumption and high performance are key objectives in the design of on-chip networks. Recently some researchers have considered the var...
Alireza Ejlali, Bashir M. Al-Hashimi, Paul M. Rosi...
CVPR
1999
IEEE
16 years 7 months ago
Integrating Shape from Shading and Range Data Using Neural Networks
This paper presents a framework for integrating multiple sensory data, sparse range data and dense depth maps from shape from shading in order to improve the 3D reconstruction of ...
Mostafa G.-H. Mostafa, Sameh M. Yamany, Aly A. Far...
EJWCN
2010
122views more  EJWCN 2010»
14 years 12 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
EXPERT
2010
145views more  EXPERT 2010»
15 years 2 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
253
Voted
EUROCRYPT
2011
Springer
14 years 8 months ago
Statistical Attack on RC4 - Distinguishing WPA
Abstract. In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4000 pack...
Pouyan Sepehrdad, Serge Vaudenay, Martin Vuagnoux