Sciweavers

206 search results - page 26 / 42
» Use of Chinese Short Messages
Sort
View
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 11 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...
IFIP12
2007
13 years 8 months ago
Hardware Natural Language Interface
In this paper an efficient architecture for natural language processing is presented, implemented in hardware using FPGAs (Field Programmable Gate Arrays). The system can receive s...
Christos Pavlatos, Alexandros C. Dimopoulos, Georg...
HICSS
2008
IEEE
153views Biometrics» more  HICSS 2008»
13 years 7 months ago
Fault-Tolerant k-Fold Pivot Routing in Wireless Sensor Networks
Selecting a small set of nodes called pivots, from all the nodes in a network and maintaining the routing infrastructure to and among each other can reduce routing overhead and ex...
Doina Bein
BVAI
2007
Springer
14 years 1 months ago
Non-invasive Brain-Actuated Interaction
The promise of Brain-Computer Interfaces (BCI) technology is to augment human capabilities by enabling interaction with computers through a conscious and spontaneous modulation of ...
José del R. Millán, Pierre W. Ferrez...
AINA
2008
IEEE
14 years 1 months ago
Wireless Sensor Network for Localized Maritime Monitoring
In this paper, we propose a novel routing algorithm for maritime monitoring of short term events where large area monitoring relies on small buoys drifting along with local curren...
Pedro N. E. S. Barbosa, Neil M. White, Nick R. Har...