Sciweavers

98 search results - page 13 / 20
» A note on weak dividing
Sort
View
AINA
2008
IEEE
14 years 2 months ago
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination
In this paper, we propose a map matching algorithm for car navigation systems that predict user destination. This car navigation system is a novel system that automatically predict...
Koichi Miyashita, Tsutomu Terada, Shojiro Nishio
ICYCS
2008
IEEE
14 years 1 months ago
VM-based Architecture for Network Monitoring and Analysis
A single physical machine provides multiple network monitoring and analysis services (e.g., IDS, QoS) which are installed on the same operating system. Isolation between services ...
Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li
RTA
1991
Springer
13 years 11 months ago
Completeness of Combinations of Constructor Systems
A term rewriting system is called complete if it is both confluent and strongly norrealizing. Barendregt and Klop showed that the disjoint union of complete term rewriting systems...
Aart Middeldorp, Yoshihito Toyama
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
DICTA
2003
13 years 9 months ago
Face Recognition Based on Multiple Region Features
For face recognition, face feature selection is an important step. Better features should result in better performance. This paper describes a robust face recognition algorithm usi...
Jiaming Li, Geoff Poulton, Ying Guo, Rong-yu Qiao