Sciweavers

2624 search results - page 348 / 525
» The 2LIP model and its implementations
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
AISS
2010
165views more  AISS 2010»
13 years 8 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
ACCV
2010
Springer
13 years 5 months ago
Towards Full 3D Helmholtz Stereovision Algorithms
Helmholtz stereovision methods are limited to binocular stereovision or depth maps reconstruction. In this paper, we extend these methods to recover the full 3D shape of the object...
Amaël Delaunoy, Emmanuel Prados, Peter N. Bel...
TCSV
2011
13 years 5 months ago
Mixture of Gaussians-Based Background Subtraction for Bayer-Pattern Image Sequences
This paper proposes a background subtraction method for Bayer-pattern image sequences. The proposed method models the background in a Bayer-pattern domain using a mixture of Gauss...
Jae Kyu Suhr, Ho Gi Jung, Gen Li, Jaihie Kim
JAIR
2010
130views more  JAIR 2010»
13 years 5 months ago
Interactive Cost Configuration Over Decision Diagrams
In many AI domains such as product configuration, a user should interactively specify a solution that must satisfy a set of constraints. In such scenarios, offline compilation of ...
Henrik Reif Andersen, Tarik Hadzic, David Pisinger