Sciweavers

503 search results - page 78 / 101
» Using The Same System For Analyzing And Synthesizing Sentenc...
Sort
View
DCC
2001
IEEE
15 years 9 months ago
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Recently, and contrary to the common belief, Rivest and Silverman argued that the use of strong primes is unnecessary in the RSA cryptosystem. This paper analyzes how valid this as...
Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takag...
CHI
2010
ACM
15 years 4 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
83
Voted
IROS
2009
IEEE
195views Robotics» more  IROS 2009»
15 years 4 months ago
Appearance contrast for fast, robust trail-following
— We describe a framework for finding and tracking “trails” for autonomous outdoor robot navigation. Through a combination of visual cues and ladar-derived structural inform...
Christopher Rasmussen, Yan Lu, Mehmet Kocamaz
61
Voted
CLUSTER
2008
IEEE
15 years 4 months ago
Message progression in parallel computing - to thread or not to thread?
Abstract—Message progression schemes that enable communication and computation to be overlapped have the potential to improve the performance of parallel applications. With curre...
Torsten Hoefler, Andrew Lumsdaine
78
Voted
EOR
2006
88views more  EOR 2006»
14 years 9 months ago
Nonessential objectives within network approaches for MCDM
In Gal and Hanne [Eur. J. Oper. Res. 119 (1999) 373] the problem of using several methods to solve a multiple criteria decision making (MCDM) problem with linear objective functio...
Tomas Gal, Thomas Hanne