Sciweavers

1556 search results - page 261 / 312
» Information Envelope and its Information Integrity Implicati...
Sort
View
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 2 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
EDBT
2009
ACM
127views Database» more  EDBT 2009»
14 years 2 months ago
Approximate substring selectivity estimation
We study the problem of estimating selectivity of approximate substring queries. Its importance in databases is ever increasing as more and more data are input by users and are in...
Hongrae Lee, Raymond T. Ng, Kyuseok Shim
FOSSACS
2009
Springer
14 years 2 months ago
Synthesis from Component Libraries
Abstract. Synthesis is the automatic construction of a system from its specification. In the classical synthesis algorithms it is always assumed the system is “constructed from ...
Yoad Lustig, Moshe Y. Vardi
RECONFIG
2009
IEEE
269views VLSI» more  RECONFIG 2009»
14 years 2 months ago
A 10 Gbps OTN Framer Implementation Targeting FPGA Devices
Abstract—Integrated circuits for very high-speed telecommunication protocols often use ASICs, due to their strict timing constraints. This scenario is changing, since modern FPGA...
Guilherme Guindani, Frederico Ferlini, Jeferson Ol...
KI
2009
Springer
14 years 2 months ago
Robust Processing of Situated Spoken Dialogue
Spoken dialogue is notoriously hard to process with standard language processing technologies. Dialogue systems must indeed meet two major challenges. First, natural spoken dialogu...
Pierre Lison, Geert-Jan M. Kruijff