Sciweavers

1336 search results - page 148 / 268
» codes 2005
Sort
View
95
Voted
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 7 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
135
Voted
PRDC
2005
IEEE
15 years 6 months ago
On Automating Failure Mode Analysis and Enhancing its Integrity
This paper reports our experience on the development of a design-for-safety (DFS) workbench called Risk Assessment and Management Environment (RAME) for microelectronic avionics s...
Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkala...
CAGD
2005
88views more  CAGD 2005»
15 years 20 days ago
An efficient bit allocation for compressing normal meshes with an error-driven quantization
We propose a new wavelet compression algorithm based on the rate-distortion optimization for densely sampled triangular meshes. Exploiting the normal remesher of Guskov et al., th...
Frédéric Payan, Marc Antonini
105
Voted
CVPR
2005
IEEE
16 years 2 months ago
Bayesian Image Segmentation Using Wavelet-Based Priors
This paper introduces a formulation which allows using wavelet-based priors for image segmentation. This formulation can be used in supervised, unsupervised, or semisupervised mod...
Mário A. T. Figueiredo
70
Voted
ICIP
2005
IEEE
16 years 2 months ago
Wyner-Ziv video side estimator: conventional motion search methods revisited
Side estimation plays an important role in Wyner-Ziv video coding. In this paper, we examine the use of two conventional motion search methods to improve side estimation. Unlike m...
Zhen Li, Edward J. Delp