Sciweavers

1396 search results - page 112 / 280
» aim 2006
Sort
View
108
Voted
EVOW
2006
Springer
15 years 4 months ago
A Connectionist Architecture for the Evolution of Rhythms
In this paper we propose the use of an interactive multi-agent system for the study of rhythm evolution. The aim of the model proposed here is to show to what extent new rhythms em...
João Magalhães Martins, Eduardo Reck...
123
Voted
EWSA
2006
Springer
15 years 4 months ago
Component Deployment Evolution Driven by Architecture Patterns and Resource Requirements
Software architectures are often designed with respect to some architecture patterns, like the pipeline and peer-to-peer. These patterns are the guarantee of some quality attribute...
Didier Hoareau, Chouki Tibermacine
99
Voted
FC
2006
Springer
119views Cryptology» more  FC 2006»
15 years 4 months ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
99
Voted
FDTC
2006
Springer
106views Cryptology» more  FDTC 2006»
15 years 4 months ago
Sign Change Fault Attacks on Elliptic Curve Cryptosystems
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit different number representations as they are often emplo...
Johannes Blömer, Martin Otto 0002, Jean-Pierr...
FGR
2006
IEEE
108views Biometrics» more  FGR 2006»
15 years 4 months ago
Regression and Classification Approaches to Eye Localization in Face Images
We address the task of accurately localizing the eyes in face images extracted by a face detector, an important problem to be solved because of the negative effect of poor localiz...
Mark Everingham, Andrew Zisserman