Sciweavers

1746 search results - page 258 / 350
» A linear implementation of PACMAN
Sort
View
121
Voted
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 9 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
134
Voted
CICLING
2007
Springer
15 years 9 months ago
Finite-State Technology as a Programming Environment
Finite-state technology is considered the preferred model for representing the phonology and morphology of natural languages. The attractiveness of this technology for natural lang...
Shuly Wintner
129
Voted
CIT
2007
Springer
15 years 9 months ago
An 802.11 Based MAC Protocol for Providing QoS to Real Time Applications
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Mayank Mishra, Anirudha Sahoo
146
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Towards Real-Time Compression of Hyperspectral Images Using Virtex-II FPGAs
Abstract. Hyperspectral imagery is a new type of high-dimensional image data which is now used in many Earth-based and planetary exploration applications. Many efforts have been d...
Antonio Plaza
107
Voted
FIMH
2007
Springer
15 years 9 months ago
Constitutive Modeling of Cardiac Tissue Growth
Abstract. Long term responses of the heart to e.g. infarction or surgical intervention are related to response of the tissue to changes in the mechanical environment. The tissue re...
Wilco Kroon, Tammo Delhaas, Theo Arts, Peter Boven...