Sciweavers

762 search results - page 94 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
CVPR
2009
IEEE
15 years 3 months ago
Learning Shape Prior Models for Object Matching
The aim of this work is to learn a shape prior model for an object class and to improve shape matching with the learned shape prior. Given images of example instances, we can le...
Cordelia Schmid, Frédéric Jurie, Tin...
ICSE
2005
IEEE-ACM
14 years 8 months ago
An empirical study of fault localization for end-user programmers
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...
CASES
2003
ACM
14 years 1 months ago
Frequent loop detection using efficient non-intrusive on-chip hardware
Dynamic software optimization methods are becoming increasingly popular for improving software performance and power. The first step in dynamic optimization consists of detecting ...
Ann Gordon-Ross, Frank Vahid
EUROCRYPT
2004
Springer
14 years 7 days ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
WWW
2008
ACM
14 years 9 months ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...