Sciweavers

530 search results - page 47 / 106
» Practical Threshold Signatures
Sort
View
AFRICACRYPT
2010
Springer
13 years 11 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
HAPTICS
2007
IEEE
14 years 2 months ago
Proposal for tactile sense presentation that combines electrical and mechanical stimulus
This study proposes a combination of electrical and mechanical stimulation as a foundational method to realize a tactile display with a high temporal and spatial resolution. We fu...
Shinobu Kuroki, Hiroyuki Kajimoto, Hideaki Nii, Na...
SIAMNUM
2010
105views more  SIAMNUM 2010»
13 years 2 months ago
Convergence Analysis for Incompressible Generalized Newtonian Fluid Flows with Nonstandard Anisotropic Growth Conditions
We study equations to describe incompressible generalized Newtonian fluids, where the extra stress tensor satisfies a nonstandard anisotropic asymptotic growth condition. An implic...
Erich Carelli, Jonas Haehnle, Andreas Prohl
ICPR
2008
IEEE
14 years 2 months ago
Automatic road sign detection method based on Color Barycenters Hexagon model
Road sign detection is one of the major concerned topics in the field of driving safety and intelligent vehicle. In this paper, a novel model based on Color Barycenters Hexagon (C...
Qieshi Zhang, Sei-ichiro Kamata
ENTCS
2006
134views more  ENTCS 2006»
13 years 8 months ago
Computing Over-Approximations with Bounded Model Checking
Bounded Model Checking (BMC) searches for counterexamples to a property with a bounded length k. If no such counterexample is found, k is increased. This process terminates when ...
Daniel Kroening