Sciweavers

1268 search results - page 220 / 254
» Direct Translation Model 2
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
INTERSPEECH
2010
13 years 4 months ago
On the interdependencies between voice quality, glottal gaps, and voice-source related acoustic measures
In human speech production, the voice source contains important non-lexical information, especially relating to a speaker's voice quality. In this study, direct measurements ...
Yen-Liang Shue, Gang Chen, Abeer Alwan
GANDC
2011
105views more  GANDC 2011»
12 years 9 months ago
Adjacent versus coincident representations of geospatial uncertainty: Which promote better decisions?
3D geological models commonly built to manage natural resources are much affected by uncertainty because most of the subsurface is inaccessible to direct observation. Appropriate ...
Thomas Viard, Guillaume Caumon, Bruno Lévy
TIP
1998
456views more  TIP 1998»
12 years 5 months ago
Snakes, Shapes, and Gradient Vector Flow
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initiali...
Chenyang Xu, Jerry L. Prince
ICIP
2003
IEEE
14 years 11 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo