Sciweavers

1628 search results - page 297 / 326
» Compiler Construction Using Scheme
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 2 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
QUESTA
2010
93views more  QUESTA 2010»
13 years 2 months ago
Towards an Erlang formula for multiclass networks
Consider a multiclass stochastic network with state dependent service rates and arrival rates describing bandwidth-sharing mechanisms as well as admission control and/or load bala...
Matthieu Jonckheere, Jean Mairesse
TMM
2010
133views Management» more  TMM 2010»
13 years 2 months ago
Cross-Media Alignment of Names and Faces
In this paper we report on our experiments on aligning names and faces as found in images and captions of online news websites. Developing accurate technologies for linking names a...
Phi The Pham, Marie-Francine Moens, Tinne Tuytelaa...
ICASSP
2011
IEEE
12 years 11 months ago
A new speaker identification algorithm for gaming scenarios
Speaker identification is a well-established research problem but has not been a major application used in gaming scenarios. In this paper, we propose a new algorithm for the ope...
Hoang Do, Ivan Tashev, Alex Acero
IACR
2011
120views more  IACR 2011»
12 years 7 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo