Sciweavers

766 search results - page 38 / 154
» How to Read a Signature
Sort
View
ACL
2001
13 years 10 months ago
Underspecified Beta Reduction
For ambiguous sentences, traditional semantics construction produces large numbers of higher-order formulas, which must then be -reduced individually. Underspecified versions can ...
Manuel Bodirsky, Katrin Erk, Alexander Koller, Joa...
CHES
2004
Springer
136views Cryptology» more  CHES 2004»
14 years 2 months ago
Attacking DSA Under a Repeated Bits Assumption
We discuss how to recover the private key for DSA style signature schemes if partial information about the ephemeral keys is revealed. The partial information we examine is of a se...
Peter J. Leadbitter, Dan Page, Nigel P. Smart
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
14 years 3 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves

Book
5690views
15 years 6 months ago
The OpenGL Reference Manual - The Bluebook
"This manual is designed to be used as the companion reference volume to the OpenGL Programming Guide by Jackie Neider, Tom Davis, and Mason Woo (Reading, MA: Addison-Wesley P...
Dave Shreiner
CIS
2007
Springer
14 years 3 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...