Sciweavers

1405 search results - page 9 / 281
» We Are No Longer A Priesthood
Sort
View
ISW
1997
Springer
15 years 1 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
73
Voted
ANLP
2000
77views more  ANLP 2000»
14 years 10 months ago
Unit Completion for a Computer-aided Translation Typing System
This work is in the context of TransType, a system that observes its user as he or she types a translation and repeatedly suggests completions for the text already entered. The us...
Philippe Langlais, George F. Foster, Guy Lapalme
ISSAC
2005
Springer
101views Mathematics» more  ISSAC 2005»
15 years 2 months ago
Adherence is better than adjacency: computing the Riemann index using CAD
Given an elementary function with algebraic branch cuts, we show how to decide which sheet of the associated Riemann surface we are on at any given point. We do this by establishi...
James C. Beaumont, Russell J. Bradford, James H. D...
DALT
2006
Springer
15 years 1 months ago
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
Agents in an open system interact with each other based on (typically, published) protocols. An agent may, however, deviate from the protocol because of its internal policies. Such...
Amit K. Chopra, Munindar P. Singh
EUROSSC
2008
Springer
14 years 11 months ago
Gaussian Process Person Identifier Based on Simple Floor Sensors
Abstract. This paper describes methods and sensor technology used to identify persons from their walking characteristics. We use an array of simple binary switch floor sensors to d...
Jaakko Suutala, Kaori Fujinami, Juha Röning