Sciweavers

206 search results - page 34 / 42
» Simplifying failure-inducing input
Sort
View
SAT
2009
Springer
126views Hardware» more  SAT 2009»
14 years 2 months ago
Extending SAT Solvers to Cryptographic Problems
Cryptography ensures the confidentiality and authenticity of information but often relies on unproven assumptions. SAT solvers are a powerful tool to test the hardness of certain ...
Mate Soos, Karsten Nohl, Claude Castelluccia
CDC
2008
IEEE
170views Control Systems» more  CDC 2008»
14 years 2 months ago
Modeling and control of the protein synthesis process in eukaryotic cells
— Protein synthesis is an essential process of cell cycle and growth in eukaryotic cells. The initiation stage of the translation process is known to be the most crucial in regul...
Nadav S. Bar, Rahmi Lale
AVSS
2007
IEEE
14 years 2 months ago
Sign language detection using 3D visual cues
A 3D visual hand gesture recognition method is proposed that detects correctly performed signs from stereo camera input. Hand tracking is based on skin detection with an adaptive ...
Jeroen Lichtenauer, Gineke A. ten Holt, Emile A. H...
HICSS
2007
IEEE
135views Biometrics» more  HICSS 2007»
14 years 2 months ago
Composable Language Extensions for Computational Geometry: A Case Study
— This paper demonstrates how two different sets of powerful domain specific language features can be specified and deployed as composable language extensions. These extensions...
Eric Van Wyk, Eric Johnson
SACRYPT
2007
Springer
14 years 1 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer