Sciweavers

1328 search results - page 178 / 266
» Common Knowledge
Sort
View
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
14 years 1 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir
WOMPAT
2001
Springer
14 years 1 months ago
A Study of Implicit Data Distribution Methods for OpenMP Using the SPEC Benchmarks
In contrast to the common belief that OpenMP requires data-parallel extensions to scale well on architectures with non-uniform memory access latency, recent work has shown that it ...
Dimitrios S. Nikolopoulos, Eduard Ayguadé
ICPR
2000
IEEE
14 years 1 months ago
Skin Detection in Video under Changing Illumination Conditions
Techniques for color-based tracking of faces or hands often assume a static skin color model. However, skin color perceived by a camera can change when lighting changes. In common...
Maricor Soriano, Birgitta Martinkauppi, Sami Huovi...
ACMDIS
2000
ACM
14 years 1 months ago
A Pattern Approach to Interaction Design
To create successful interactive systems, user interface designers need to cooperate with developers and application domain experts in an interdisciplinary team. These groups, how...
Jan O. Borchers
CHI
2000
ACM
14 years 1 months ago
Evaluation of eye gaze interaction
Eye gaze interaction can provide a convenient and natural addition to user-computer dialogues. We have previously reported on our interaction techniques using eye gaze [10]. While...
Linda E. Sibert, Robert J. K. Jacob