Sciweavers

3116 search results - page 183 / 624
» Recovering
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
ICIAP
2009
ACM
14 years 5 months ago
Hallucinating Faces: Global Linear Modal Based Super-Resolution and Position Based Residue Compensation
A learning-based face hallucination method is proposed in this paper for the reconstruction of a high-resolution face image from a low-resolution observation based on a set of high...
Xiang Ma, Junping Zhang, Chun Qi
RECOMB
2009
Springer
14 years 5 months ago
Phylogenies without Branch Bounds: Contracting the Short, Pruning the Deep
Abstract Constantinos Daskalakis1 , Elchanan Mossel2, , and Sebastien Roch1 1 Microsoft Research 2 UC Berkeley and Weizman Institute We introduce a new phylogenetic reconstruction ...
Constantinos Daskalakis, Elchanan Mossel, Sé...
STACS
2009
Springer
14 years 5 months ago
Locally Decodable Quantum Codes
We study a quantum analogue of locally decodable error-correcting codes. A q-query locally decodable quantum code encodes n classical bits in an m-qubit state, in such a way that ...
Jop Briet, Ronald de Wolf
CONIELECOMP
2009
IEEE
14 years 5 months ago
A Power-Line Communication Modem Based on OFDM
In this paper, we present the design and implementation of a PLC (Power-Line Communication) Modem based on Orthogonal Frequency Division Multiplexing (OFDM). The PLC device implem...
H. A. Garcia-Baleon, Vicente Alarcón Aquino