Sciweavers

337 search results - page 34 / 68
» On Weak Markov's Principle
Sort
View
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
13 years 11 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
HAPTICS
2009
IEEE
13 years 11 months ago
The impact of feedback design in haptic volume visualization
Enhancing volume visualization with additional cues from our sense of touch has shown the potential to increase both speed and accuracy in the data exploration. Research in the ar...
Karljohan E. Lundin Palmerius, Camilla Forsell
CCIA
2008
Springer
13 years 9 months ago
Motion Segmentation: a Review
Motion segmentation is an essential process for many computer vision algorithms. During the last decade, a large amount of work has been trying to tackle this challenge, however, p...
Luca Zappella, Xavier Lladó, Joaquim Salvi
ERSA
2007
108views Hardware» more  ERSA 2007»
13 years 9 months ago
Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation
- Two fault isolation approaches based on Combinatorial Group Testing (CGT) are presented. Although they both share the basic principle of grouping suspect resources into subgroups...
Rawad N. Al-Haddad, Carthik A. Sharma, Ronald F. D...
WICSA
2008
13 years 9 months ago
Developing Value Assessment for SW Architecture
During the last decades software architecture has become increasingly important for companies creating competitive product structures. Recently more and more attention has also be...
Pasi Ojala