Sciweavers

761 search results - page 51 / 153
» Concise and Consistent Naming
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ICASSP
2009
IEEE
14 years 4 months ago
View-invariant tensor null-space representation for multiple motion trajectory retrieval and classification
In this paper, we propose a novel general framework for tensor based null space affine invariants, namely, tensor null space invariants (TNSI) with a linear classifier for high ...
Xu Chen, Dan Schonfeld, Ashfaq Khokhar
DEXAW
2008
IEEE
128views Database» more  DEXAW 2008»
14 years 4 months ago
Proximity Estimation and Hardness of Short-Text Corpora
Abstract—In this work, we investigate the relative hardness of shorttext corpora in clustering problems and how this hardness relates to traditional similarity measures. Our appr...
Marcelo Luis Errecalde, Diego Ingaramo, Paolo Ross...
ICIW
2008
IEEE
14 years 4 months ago
Persistency for Java-Based Mobile Agent Systems
—In this paper, we present mobile agent systems supporting persistency. In order to develop the mobile agent systems, a mobile agent framework has to have functions to support pe...
Shinichi Motomura, Takao Kawamura, Kazunori Sugaha...
ICASSP
2007
IEEE
14 years 4 months ago
The Biosecure Geometry-Based System for Hand Modality
We present an identification and authentication system based on hand modality which is part of a reference system for all modalities developed within the Biosecure consortium. It...
Geoffroy Fouquier, Laurence Likforman-Sulem, J&eac...