Sciweavers

729 search results - page 86 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
ICST
2009
IEEE
13 years 7 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
FSE
2011
Springer
263views Cryptology» more  FSE 2011»
13 years 1 months ago
Practical Near-Collisions on the Compression Function of BMW
Abstract. Blue Midnight Wish (BMW) is one of the fastest SHA-3 candidates in the second round of the competition. In this paper we study the compression function of BMW and we obta...
Gaëtan Leurent, Søren S. Thomsen
VIS
2007
IEEE
216views Visualization» more  VIS 2007»
14 years 11 months ago
Interactive Isosurface Ray Tracing of Time-Varying Tetrahedral Volumes
Abstract-- We describe a system for interactively rendering isosurfaces of tetrahedral finite-element scalar fields using coherent ray tracing techniques on the CPU. By employing s...
Ingo Wald, Heiko Friedrich, Aaron Knoll, Charle...
ICPR
2002
IEEE
14 years 11 months ago
Hierarchical Recognition of Intentional Human Gestures for Sports Video Annotation
We present a novel technique for the recognition of complex human gestures for video annotation using accelerometers and the hidden Markov model. Our extension to the standard hid...
Graeme S. Chambers, Svetha Venkatesh, Geoff A. W. ...
ISPASS
2010
IEEE
14 years 5 months ago
Demystifying GPU microarchitecture through microbenchmarking
—Graphics processors (GPU) offer the promise of more than an order of magnitude speedup over conventional processors for certain non-graphics computations. Because the ften prese...
Henry Wong, Misel-Myrto Papadopoulou, Maryam Sadoo...