Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
This paper proposes a new test pattern generator (TPG) which is an enhancement of GLFSR (Galois LFSR). This design is based on certain non–binary error detecting codes, formulat...
In this paper we present a number of improvements that were recently made to the template based speech recognition system developed at ESAT. Combining these improvements resulted ...
Kris Demuynck, Dino Seppi, Hugo Van hamme, Dirk Va...
: Rendering and animating numerous articulated characters interactively is challenging in computer graphics. Specific hardware systems may be needed. However, by using the temporal...