Sciweavers

1679 search results - page 209 / 336
» Strong order equivalence
Sort
View
ACSAC
2002
IEEE
14 years 1 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti
SC
2009
ACM
14 years 1 months ago
Comparative study of one-sided factorizations with multiple software packages on multi-core hardware
The emergence and continuing use of multi-core architectures require changes in the existing software and sometimes even a redesign of the established algorithms in order to take ...
Emmanuel Agullo, Bilel Hadri, Hatem Ltaief, Jack D...
ACCV
2009
Springer
14 years 1 months ago
Extracting Spatio-temporal Local Features Considering Consecutiveness of Motions
Recently spatio-temporal local features have been proposed as image features to recognize events or human actions in videos. In this paper, we propose yet another local spatio-temp...
Akitsugu Noguchi, Keiji Yanai
SIGGRAPH
2010
ACM
14 years 1 months ago
Micropolygon ray tracing with defocus and motion blur
We present a micropolygon ray tracing algorithm that is capable of efficiently rendering high quality defocus and motion blur effects. A key component of our algorithm is a BVH (...
Qiming Hou, Hao Qin, Wenyao Li, Baining Guo, Kun Z...
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
14 years 1 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir