Sciweavers

10805 search results - page 2109 / 2161
» Mapping Computation with No Memory
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
14 years 3 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
NOCS
2007
IEEE
14 years 3 months ago
The Power of Priority: NoC Based Distributed Cache Coherency
The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
PPSN
1990
Springer
14 years 23 days ago
Feature Construction for Back-Propagation
T h e ease of learning concepts f r o m examples in empirical machine learning depends on the attributes used for describing the training d a t a . We show t h a t decision-tree b...
Selwyn Piramuthu
ECCV
2008
Springer
14 years 10 months ago
Robust 3D Pose Estimation and Efficient 2D Region-Based Segmentation from a 3D Shape Prior
In this work, we present an approach to jointly segment a rigid object in a 2D image and estimate its 3D pose, using the knowledge of a 3D model. We naturally couple the two proces...
Samuel Dambreville, Romeil Sandhu, Anthony J. Yezz...
MOBICOM
2004
ACM
14 years 2 months ago
Practical robust localization over large-scale 802.11 wireless networks
We demonstrate a system built using probabilistic techniques that allows for remarkably accurate localization across our entire office building using nothing more than the built-...
Andreas Haeberlen, Eliot Flannery, Andrew M. Ladd,...
« Prev « First page 2109 / 2161 Last » Next »