Sciweavers

1385 search results - page 228 / 277
» Clustering by Random Projections
Sort
View
92
Voted
CCIA
2007
Springer
15 years 10 months ago
Using the Average Landmark Vector Method for Robot Homing
Several methods can be used for a robot to return to a previously visited position. In our approach we use the average landmark vector method to calculate a homing vector which sho...
Alex Goldhoorn, Arnau Ramisa, Ramon López d...
118
Voted
ISW
2007
Springer
15 years 9 months ago
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
NLS is a stream cipher which was submitted to eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called as Crossword Puzzle at...
Joo Yeon Cho, Josef Pieprzyk
132
Voted
PEWASUN
2006
ACM
15 years 9 months ago
Revisiting neighbor discovery with interferences consideration
In wireless multi-hop networks, hello protocols for neighbor discovery are a basic service offered by the networking stack. However, their study usually rely on rather simplistic...
Elyes Ben Hamida, Guillaume Chelius, Eric Fleury
143
Voted
EUROMICRO
2005
IEEE
15 years 9 months ago
Software Security Analysis - Execution Phase Audit
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one exploitable vulnerability was found for every 4000 line...
Bengt Carlsson, Dejan Baca
130
Voted
INDOCRYPT
2005
Springer
15 years 9 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov