Sciweavers

3190 search results - page 85 / 638
» cans 2011
Sort
View
85
Voted
IACR
2011
85views more  IACR 2011»
14 years 7 days ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
CVPR
2011
IEEE
14 years 10 months ago
Learning Hierarchical Poselets for Human Parsing
We consider the problem of human parsing with partbased models. Most previous work in part-based models only considers rigid parts (e.g. torso, head, half limbs) guided by human a...
Yang Wang, Duan Tran, Zicheng Liao
CVPR
2011
IEEE
14 years 8 months ago
Recovering Shape from a Single Image of a Mirrored Surface from Curvature Constraints
This paper presents models and algorithms for estimating the shape of a mirrored surface from a single image of that surface, rendered under an unknown, natural illumination. Whil...
Marshall Tappen
107
Voted
COR
2011
14 years 7 months ago
On the application of graph colouring techniques in round-robin sports scheduling
The purpose of this paper is twofold. First, it explores the issue of producing valid, compact round-robin sports schedules by considering the problem as one of graph colouring. U...
R. Lewis, J. Thompson
CORR
2011
Springer
339views Education» more  CORR 2011»
14 years 7 months ago
Context Capture in Software Development
The context of a software developer is something hard to define and capture, as it represents a complex network of elements across different dimensions that are not limited to th...
Bruno Antunes, Francisco Correia, Paulo Gomes