Sciweavers

1085 search results - page 178 / 217
» A Timing Attack on RC5
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 3 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
ESA
2003
Springer
99views Algorithms» more  ESA 2003»
14 years 3 months ago
Adversary Immune Leader Election in ad hoc Radio Networks
Abstract. Recently, efficient leader election algorithms for ad hoc radio networks with low time complexity and energy cost have been designed even for the no-collision detection,...
Miroslaw Kutylowski, Wojciech Rutkowski
ATAL
2008
Springer
13 years 11 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
TASLP
2008
124views more  TASLP 2008»
13 years 9 months ago
Sparse Linear Regression With Structured Priors and Application to Denoising of Musical Audio
Abstract--We describe in this paper an audio denoising technique based on sparse linear regression with structured priors. The noisy signal is decomposed as a linear combination of...
Cédric Févotte, Bruno Torrésa...
MICCAI
2005
Springer
14 years 10 months ago
Intravascular Ultrasound-Based Imaging of Vasa Vasorum for the Detection of Vulnerable Atherosclerotic Plaque
Vulnerable plaques are dangerous atherosclerotic lesions that bear a high risk of complications that can lead to heart attacks and strokes. These plaques are known to be chronicall...
Sean M. O'Malley, Manolis Vavuranakis, Morteza Nag...