Sciweavers

490 search results - page 60 / 98
» Equivalent Keys of HPC
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...
ICB
2009
Springer
140views Biometrics» more  ICB 2009»
14 years 3 months ago
A Discriminant Analysis Method for Face Recognition in Heteroscedastic Distributions
Linear discriminant analysis (LDA) is a popular method in pattern recognition and is equivalent to Bayesian method when the sample distributions of different classes are obey to t...
Zhen Lei, ShengCai Liao, Dong Yi, Rui Qin, Stan Z....
DATE
2007
IEEE
184views Hardware» more  DATE 2007»
14 years 3 months ago
New safety critical radio altimeter for airbus and related design flow
The latest generation of the ERT560 Digital Radio Altimeter (DRA) developed for the Airbus A380 is the result of Thales’ 40 years experience. Over 40,000 radio-altimeters have b...
D. Hairion, S. Emeriau, E. Combot, Michel Sarlotte
ICC
2007
IEEE
14 years 3 months ago
Wireless Packet Scheduling With Soft Deadlines
— We address the problem of scheduling multiple traffic streams associated with target profiles on a shared wireless link, arising in real-time applications with soft/flexible...
Aditya Dua, Nicholas Bambos
AI
2007
Springer
14 years 2 months ago
Adding Local Constraints to Bayesian Networks
When using Bayesian networks, practitioners often express constraints among variables by conditioning a common child node to induce the desired distribution. For example, an ‘or...
Mark Crowley, Brent Boerlage, David Poole