Sciweavers

17 search results - page 3 / 4
» Improved Collision Search for SHA-0
Sort
View
ICCV
2009
IEEE
1190views Computer Vision» more  ICCV 2009»
15 years 9 days ago
You'll never walk alone: modeling social behavior for multi-target tracking
Object tracking typically relies on a dynamic model to predict the object’s location from its past trajectory. In crowded scenarios a strong dynamic model is particularly impo...
S. Pellegrini, A. Ess, K. Schindler, L. van Gool
ICRA
2009
IEEE
119views Robotics» more  ICRA 2009»
14 years 2 months ago
Survivability: Measuring and ensuring path diversity
— A novel criterion is introduced for assessing the diversity of a collection of paths or trajectories. The main idea is the notion of survivability, which measures the likelihoo...
Lawrence H. Erickson, Steven M. LaValle
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 21 days ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
MICRO
2005
IEEE
110views Hardware» more  MICRO 2005»
14 years 27 days ago
Scalable Store-Load Forwarding via Store Queue Index Prediction
Conventional processors use a fully-associative store queue (SQ) to implement store-load forwarding. Associative search latency does not scale well to capacities and bandwidths re...
Tingting Sha, Milo M. K. Martin, Amir Roth
SIGCOMM
2005
ACM
14 years 26 days ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...