Sciweavers

12183 search results - page 57 / 2437
» Computers under Attacks!
Sort
View
ICIP
2009
IEEE
13 years 7 months ago
Better computer vision under video compression, an example using mean shift tracking
Salman Aslam, Aaron F. Bobick, Christopher F. Barn...
INTERACTIONS
2011
47views more  INTERACTIONS 2011»
13 years 4 months ago
UNDER DEVELOPMENT: While the meter is running: computing in a capped world
Marshini Chetty, Richard Banks, A. J. Bernheim Bru...
AI
2007
Springer
13 years 10 months ago
Computational properties of argument systems satisfying graph-theoretic constraints
One difficulty that arises in abstract argument systems is that many natural questions regarding argument acceptability are, in general, computationally intractable having been c...
Paul E. Dunne
ATAL
2009
Springer
14 years 4 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ASIACRYPT
2011
Springer
12 years 10 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...