Sciweavers

963 search results - page 124 / 193
» Conditional Digital Signatures
Sort
View

Book
600views
15 years 9 months ago
Computer Vision: Algorithms and Applications
A DRAFT computer vision book by Prof. Richard Szeliski. The book reflects the author's wide experience in practical computer vision algorithms that he has developed while work...
Richard Szeliski
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 10 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
GECCO
2009
Springer
118views Optimization» more  GECCO 2009»
14 years 4 months ago
The impact of network topology on self-organizing maps
In this paper, we study instances of complex neural networks, i.e. neural networks with complex topologies. We use Self-Organizing Map neural networks whose neighborhood relations...
Fei Jiang, Hugues Berry, Marc Schoenauer
ISCAS
2008
IEEE
147views Hardware» more  ISCAS 2008»
14 years 4 months ago
Fast frequency acquisition all-digital PLL using PVT calibration
—Fast frequency acquisition is crucial for phase-locked loops (PLLs) used in portable devices, as on-chip clocks are frequently scaled down or up in order to manage power consump...
Hae-Soo Jeon, Duk-Hyun You, In-Cheol Park
SADFE
2008
IEEE
14 years 4 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...