Sciweavers

1262 search results - page 62 / 253
» Fast Robust Hashing
Sort
View
112
Voted
CCS
2005
ACM
15 years 8 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
117
Voted
IEEEMSP
2002
IEEE
138views Multimedia» more  IEEEMSP 2002»
15 years 7 months ago
A review of algorithms for audio fingerprinting
— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
114
Voted
ICMCS
2006
IEEE
310views Multimedia» more  ICMCS 2006»
15 years 8 months ago
An Optimal and Statistically Robust Correlation Technique for Block Based Motion Estimation
In this paper we propose an optimal and robust correlation technique for the local motion estimation purposes. It is based on the maximization of a statistical robust matching fun...
Fedwa Essannouni, Rachid Oulad Haj Thami, Ahmed Sa...
137
Voted
CDC
2009
IEEE
164views Control Systems» more  CDC 2009»
15 years 12 days ago
Real-time MPC - Stability through robust MPC design
Recent results have suggested that online Model Predictive Control (MPC) can be computed quickly enough to control fast sampled systems. High-speed applications impose a hard real-...
Melanie Nicole Zeilinger, Colin Neil Jones, Davide...
249
Voted
ICDAR
2011
IEEE
14 years 2 months ago
Robust Vanishing Point Detection for MobileCam-Based Documents
—Document images captured by a mobile phone camera often have perspective distortions. In this paper, fast and robust vanishing point detection methods for such perspective docum...
Xu-Cheng Yin, Hong-Wei Hao, Jun Sun 0004, Satoshi ...