Sciweavers

823 search results - page 102 / 165
» Stateful Subset Cover
Sort
View
CHES
2006
Springer
188views Cryptology» more  CHES 2006»
14 years 1 months ago
A Generalized Method of Differential Fault Attack Against AES Cryptosystem
Abstract. In this paper we describe two differential fault attack techniques against Advanced Encryption Standard (AES). We propose two models for fault occurrence; we could find a...
Amir Moradi, Mohammad T. Manzuri Shalmani, Mahmoud...
AIM
2006
13 years 11 months ago
Observing the use of BPM tools: A step towards flexibility
: The development of the tools of Business Process Management (BPM) arises from the spread of the notion of process in the management universe. The application of BPM to strategic ...
Joseph Heili, Jean-Mathias Heraud, Laure France
ECCC
2006
134views more  ECCC 2006»
13 years 10 months ago
Derandomizing the AW matrix-valued Chernoff bound using pessimistic estimators and applications
Ahlswede and Winter [AW02] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound for real-valued random...
Avi Wigderson, David Xiao
IJCV
2007
194views more  IJCV 2007»
13 years 10 months ago
Self-Invertible 2D Log-Gabor Wavelets
Orthogonal and biorthogonal wavelets became very popular image processing tools but exhibit major drawbacks, namely a poor resolution in orientation and the lack of translation inv...
Sylvain Fischer, Filip Sroubek, Laurent Perrinet, ...
CVPR
2009
IEEE
1385views Computer Vision» more  CVPR 2009»
15 years 5 months ago
Distributed Multi-Target Tracking In A Self-Configuring Camera Network
This paper deals with the problem of tracking multiple targets in a distributed network of self-configuring pan-tilt-zoom cameras. We focus on applications where events unfold over...
Amit K. Roy Chowdhury, Bi Song, Cristian Soto