Sciweavers

2421 search results - page 132 / 485
» Message from the Co-Chairs
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Localized Sensor Area Coverage with Low Communication Overhead
We propose several localized sensor area coverage protocols, for arbitrary ratio of sensing and transmission radii. Sensors are assumed to be time synchronized, and active sensors...
Antoine Gallais, Jean Carle, David Simplot-Ryl, Iv...
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
14 years 29 days ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...
INTERACT
2003
13 years 10 months ago
Real Time Head Gesture Recognition in Affective Interfaces
: In this paper we present the affective message box, a dialog box that employs a real time head gesture recognition system as its input modality. Head nods and shakes correspond t...
Rana El Kaliouby, Peter Robinson
CRYPTOLOGIA
2007
53views more  CRYPTOLOGIA 2007»
13 years 9 months ago
Rejewski's Catalog
When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigm...
Alex Kuhl
ICASSP
2011
IEEE
13 years 29 days ago
Graph-based sequential particle filtering in lossy networks: Single and multiple collaborative cameras
This paper presents a novel approach of multiple target tracking from multiple collaborative cameras. Firstly, particle filtering for conditional density propagation on graphs to...
Jing Huang, Dan Schonfeld