Sciweavers

650 search results - page 46 / 130
» Distorting symmetric designs
Sort
View
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
14 years 11 days ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
ICRA
2010
IEEE
87views Robotics» more  ICRA 2010»
13 years 7 months ago
DSAC - Dynamic, Single Actuated Climber: Local stability and bifurcations
— This paper investigates a novel mechanism, called DSAC for Dynamic, Single Actuated Climber, which propels itself upwards by oscillating its leg in a symmetric fashion using a ...
Amir Degani, Howie Choset, Matthew T. Mason
ICCV
1999
IEEE
14 years 10 months ago
Resolution Invariant Surfaces for Panoramic Vision Systems
A family of axially symmetric mirror shapes are proposed for panoramic imaging. These shapes keep the resolution in the image invariant to changes in elevation in the scene. In ot...
Tanya L. Conroy, John B. Moore
IBPRIA
2007
Springer
14 years 2 months ago
A Neural Network Model for Image Change Detection Based on Fuzzy Cognitive Maps
This paper outlines a neural network model based on the Fuzzy Cognitive Maps (FCM) framework for solving the automatic image change detection problem. Each pixel in the reference i...
Gonzalo Pajares, Alfonso Sánchez-Beato, Jes...
MOBISYS
2008
ACM
14 years 8 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...