Sciweavers

2795 search results - page 546 / 559
» Recommended or Not
Sort
View
LATINCRYPT
2010
13 years 6 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
MP
2010
119views more  MP 2010»
13 years 6 months ago
Efficient and fair routing for mesh networks
Inspired by the One Laptop Per Child project, we consider mesh networks that connect devices that cannot recharge their batteries easily. We study how the mesh should retransmit in...
Andrea Lodi, Enrico Malaguti, Nicolás E. St...
PAMI
2010
351views more  PAMI 2010»
13 years 5 months ago
Evaluating Color Descriptors for Object and Scene Recognition
—Image category recognition is important to access visual information on the level of objects and scene types. So far, intensity-based descriptors have been widely used for featu...
Koen E. A. van de Sande, Theo Gevers, Cees G. M. S...
PKAW
2010
13 years 5 months ago
Finding Relation between PageRank and Voter Model
Abstract. Estimating influence of a node is an important problem in social network analyses. We address this problem in a particular class of model for opinion propagation in whic...
Takayasu Fushimi, Kazumi Saito, Masahiro Kimura, H...
TKDE
2010
274views more  TKDE 2010»
13 years 5 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002