Sciweavers

1081 search results - page 112 / 217
» Working with the LR Degrees
Sort
View
91
Voted
ISDA
2009
IEEE
15 years 7 months ago
Event Related Biometrics: Towards an Unobtrusive Sensing Seat System for Continuous Human Authentication
—The present work is focused on the improvement of a Sensing Seat system previously developed by the authors for the initial authentication purpose in office and car scenarios. ...
Marcello Ferro, Giovanni Pioggia, Alessandro Togne...
97
Voted
ASIACRYPT
2009
Springer
15 years 7 months ago
Rebound Attack on the Full Lane Compression Function
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function Lane uses a permutation based compression function, consisting of a linear messag...
Krystian Matusiewicz, María Naya-Plasencia,...
107
Voted
ECMDAFA
2009
Springer
98views Hardware» more  ECMDAFA 2009»
15 years 7 months ago
A Language-Theoretic View on Guidelines and Consistency Rules of UML
Abstract. Guidelines and consistency rules of UML are used to control the degrees of freedom provided by the language to prevent faults. Guidelines are used in specific domains (e...
Zhe Chen, Gilles Motet
ER
2009
Springer
167views Database» more  ER 2009»
15 years 7 months ago
FOCIH: Form-Based Ontology Creation and Information Harvesting
Creating an ontology and populating it with data are both labor-intensive tasks requiring a high degree of expertise. Thus, scaling ontology creation and population to the size of ...
Cui Tao, David W. Embley, Stephen W. Liddle
ISSAC
2009
Springer
123views Mathematics» more  ISSAC 2009»
15 years 7 months ago
Schemes for deterministic polynomial factoring
In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects, we call m-schemes, that are generalizations o...
Gábor Ivanyos, Marek Karpinski, Nitin Saxen...