Sciweavers

387 search results - page 64 / 78
» date 2005
Sort
View
CHES
2005
Springer
156views Cryptology» more  CHES 2005»
15 years 3 months ago
A Very Compact S-Box for AES
A key step in the Advanced Encryption Standard (AES) algorithm is the “S-box.” Many implementations of AES have been proposed, for various goals, that effect the S-box in vari...
David Canright
CIKM
2005
Springer
15 years 3 months ago
Using appraisal groups for sentiment analysis
Little work to date in sentiment analysis (classifying texts by ‘positive’ or ‘negative’ orientation) has attempted to use fine-grained semantic distinctions in features ...
Casey Whitelaw, Navendu Garg, Shlomo Argamon
CIS
2005
Springer
15 years 3 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
CIVR
2005
Springer
130views Image Analysis» more  CIVR 2005»
15 years 3 months ago
Improvement on PCA and 2DPCA Algorithms for Face Recognition
Principle Component Analysis (PCA) technique is an important and well-developed area of image recognition and to date many linear discrimination methods have been put forward. Desp...
Vo Dinh Minh Nhat, Sungyoung Lee
ECAL
2005
Springer
15 years 3 months ago
Self-assembly on Demand in a Group of Physical Autonomous Mobile Robots Navigating Rough Terrain
Consider a group of autonomous, mobile robots with the ability to physically connect to one another (self-assemble). The group is said to exhibit functional self-assembly if the ro...
Rehan O'Grady, Roderich Groß, Francesco Mond...