Sciweavers

12194 search results - page 2328 / 2439
» Numberings Optimal for Learning
Sort
View
IPL
2010
98views more  IPL 2010»
15 years 2 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller
TSE
2010
152views more  TSE 2010»
15 years 2 months ago
An Experience in Testing the Security of Real-World Electronic Voting Systems
—Voting is the process through which a democratic society determines its government. Therefore, voting systems are as important as other well-known critical systems, such as air ...
Davide Balzarotti, Greg Banks, Marco Cova, Viktori...
VR
2010
IEEE
174views Virtual Reality» more  VR 2010»
15 years 2 months ago
Breaking the status quo: Improving 3D gesture recognition with spatially convenient input devices
We present a systematic study on the recognition of 3D gestures using spatially convenient input devices. Specifically, we examine the linear acceleration-sensing Nintendo Wii Re...
Michael Hoffman, Paul Varcholik, Joseph J. LaViola...
CONEXT
2010
ACM
15 years 2 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
IPPS
2010
IEEE
15 years 2 months ago
On the parallelisation of MCMC-based image processing
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...
« Prev « First page 2328 / 2439 Last » Next »