Sciweavers

1259 search results - page 155 / 252
» In search of the memoryless property
Sort
View
CISC
2009
Springer
186views Cryptology» more  CISC 2009»
13 years 5 months ago
Hardware Framework for the Rabbit Stream Cipher
Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union's eSTREAM portf...
Deian Stefan
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 4 months ago
Regression on fixed-rank positive semidefinite matrices: a Riemannian approach
The paper addresses the problem of learning a regression model parameterized by a fixed-rank positive semidefinite matrix. The focus is on the nonlinear nature of the search space...
Gilles Meyer, Silvere Bonnabel, Rodolphe Sepulchre
COMCOM
2011
13 years 2 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell
IDA
2010
Springer
13 years 2 months ago
Fingerprint classification based on subclass analysis using multiple templates of support vector machines
Fingerprint classification reduces the searching time of an automated fingerprint identification system. Since fingerprints have properties of intra-class diversities and inter-cla...
Jun-Ki Min, Jin-Hyuk Hong, Sung-Bae Cho
ACL
2011
12 years 11 months ago
Binarized Forest to String Translation
Tree-to-string translation is syntax-aware and efficient but sensitive to parsing errors. Forestto-string translation approaches mitigate the risk of propagating parser errors in...
Hao Zhang, Licheng Fang, Peng Xu, Xiaoyun Wu