Sciweavers

1179 search results - page 182 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
FOCS
2007
IEEE
15 years 10 months ago
Linear Equations Modulo 2 and the L1 Diameter of Convex Bodies
We design a randomized polynomial time algorithm which, given a 3-tensor of real numbers A = {aijk}n i,j,k=1 such that for all i, j, k ∈ {1, . . . , n} we have ai jk = aik j = a...
Subhash Khot, Assaf Naor
AVSS
2005
IEEE
15 years 10 months ago
Hypovigilence analysis: open or closed eye or mouth? Blinking or yawning frequency?
This paper proposes a frequency method to estimate the state open or closed of eye and mouth and to detect associated motion events such as blinking and yawning. The context of th...
Alexandre Benoit, Alice Caplier
CSE
2009
IEEE
15 years 11 months ago
A Study of Information Diffusion over a Realistic Social Network Model
—Sociological models of human behavior can explain population-level phenomena within social systems; computer modeling can simulate a wide variety of scenarios and allow one to p...
Andrea Apolloni, Karthik Channakeshava, Lisa Durbe...
DATE
2008
IEEE
223views Hardware» more  DATE 2008»
15 years 11 months ago
Cooperative Safety: a Combination of Multiple Technologies
—Governmental Transportation Authorities' interest in Car to Car and Car to Infrastructure has grown dramatically over the last few years in order to increase the road safet...
Raffaele Penazzi, Piergiorgio Capozio, Martin Dunc...