Sciweavers

4057 search results - page 653 / 812
» Linear combination of transformations
Sort
View
CCS
2005
ACM
14 years 1 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
IEAAIE
2005
Springer
14 years 1 months ago
Movement Prediction from Real-World Images Using a Liquid State Machine
Prediction is an important task in robot motor control where it is used to gain feedback for a controller. With such a self-generated feedback, which is available before sensor rea...
Harald Burgsteiner, Mark Kröll, Alexander Leo...
INDOCRYPT
2005
Springer
14 years 1 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
PKDD
2005
Springer
89views Data Mining» more  PKDD 2005»
14 years 1 months ago
Community Mining from Multi-relational Networks
Abstract. Social network analysis has attracted much attention in recent years. Community mining is one of the major directions in social network analysis. Most of the existing met...
Deng Cai, Zheng Shao, Xiaofei He, Xifeng Yan, Jiaw...
PPAM
2005
Springer
14 years 1 months ago
A New Diagonal Blocking Format and Model of Cache Behavior for Sparse Matrices
Algorithms for the sparse matrix-vector multiplication (shortly SpM×V ) are important building blocks in solvers of sparse systems of linear equations. Due to matrix sparsity, the...
Pavel Tvrdík, Ivan Simecek