Sciweavers

8582 search results - page 1698 / 1717
» Here or There
Sort
View
CORR
2011
Springer
205views Education» more  CORR 2011»
13 years 10 days ago
Algorithms for Implicit Hitting Set Problems
A hitting set for a collection of sets is a set that has a nonempty intersection with each set in the collection; the hitting set problem is to find a hitting set of minimum card...
Karthekeyan Chandrasekaran, Richard Karp, Erick Mo...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
13 years 9 days ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
FGR
2011
IEEE
205views Biometrics» more  FGR 2011»
13 years 8 days ago
High resolution face sequences from a PTZ network camera
Abstract— We propose here to acquire high resolution sequences of a person’s face using a pan-tilt-zoom (PTZ) network camera. This capability should prove helpful in forensic a...
Thang Ba Dinh, Nam Vo, Gérard G. Medioni
FLAIRS
2011
13 years 8 days ago
Affective Text: Generation Strategies and Emotion Measurement Issues
In affective natural language generation (NLG) a major aim is to be able to influence the emotional effects evoked in the addressee through the intelligent use of language. While...
Ielka van der Sluis, Chris Mellish, Gavin Doherty
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
13 years 7 days ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
« Prev « First page 1698 / 1717 Last » Next »