Sciweavers

1142 search results - page 160 / 229
» Some Applications of Interval Analysis to Statistical Proble...
Sort
View
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 2 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
DATE
2007
IEEE
104views Hardware» more  DATE 2007»
14 years 2 months ago
Dynamic reconfiguration in sensor networks with regenerative energy sources
In highly power constrained sensor networks, harvesting energy from the environment makes prolonged or even perpetual execution feasible. In such energy harvesting systems, energy...
Ani Nahapetian, Paolo Lombardo, Andrea Acquaviva, ...
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
13 years 11 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
MP
2011
12 years 10 months ago
Strong KKT conditions and weak sharp solutions in convex-composite optimization
Using variational analysis techniques, we study convex-composite optimization problems. In connection with such a problem, we introduce several new notions as variances of the clas...
Xi Yin Zheng, Kung Fu Ng
ACCV
2006
Springer
14 years 1 months ago
Fusion of 3D and Appearance Models for Fast Object Detection and Pose Estimation
Real-time estimation of a camera’s pose relative to an object is still an open problem. The difficulty stems from the need for fast and robust detection of known objects in the s...
Hesam Najafi, Yakup Genc, Nassir Navab