Sciweavers

1960 search results - page 71 / 392
» The Logic of Large Enough
Sort
View
ADHOCNETS
2009
Springer
14 years 2 months ago
Error Correction with the Implicit Encoding Capability of Random Network Coding
—We introduce a novel error correction scheme that uses the implicit encoding capability of Random Network Coding. This scheme does not add redundancy to the data prior to transm...
Suné von Solms, Magdalena J. Grobler, Alber...
CTRSA
2007
Springer
161views Cryptology» more  CTRSA 2007»
14 years 1 months ago
Cache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems i...
Onur Aciiçmez, Werner Schindler, Çet...
ECSQARU
2007
Springer
14 years 1 months ago
Algebraic Structures for Bipolar Constraint-Based Reasoning
The representation of both scales of cost and scales of benefit is very natural in a decision-making problem: scales of evaluation of decisions are often bipolar. The aim of this ...
Hélène Fargier, Nic Wilson
ISSAC
2005
Springer
110views Mathematics» more  ISSAC 2005»
14 years 1 months ago
Multivariate power series multiplication
We study the multiplication of multivariate power series. We show that over large enough fields, the bilinear complexity of the product modulo a monomial ideal M is bounded by th...
Éric Schost
ICIP
2003
IEEE
14 years 1 months ago
A two-stage system for meter value recognition
This paper describes a two-stage system for the recognition of postage meter values. A feed-forward Neural Abstraction Pyramid is initialized in an unsupervised manner and trained...
Sven Behnke