Sciweavers

1898 search results - page 202 / 380
» Weak Keys for IDEA
Sort
View
GW
2009
Springer
156views Biometrics» more  GW 2009»
13 years 8 months ago
Influence of Handshape Information on Automatic Sign Language Recognition
Research on automatic sign language recognition (ASLR) has mostly been conducted from a machine learning perspective. We propose to implement results from human sign recognition st...
Gineke A. ten Holt, Marcel J. T. Reinders, Emile A...
ICCV
2009
IEEE
13 years 8 months ago
Modeling 3D human poses from uncalibrated monocular images
This paper introduces an efficient algorithm that reconstructs 3D human poses as well as camera parameters from a small number of 2D point correspondences obtained from uncalibrat...
Xiaolin K. Wei, Jinxiang Chai
VLSI
2010
Springer
13 years 4 months ago
Spatial EM jamming: A countermeasure against EM Analysis?
Electro-Magnetic Analysis has been identified as an efficient technique to retrieve the secret key of cryptographic algorithms. Although similar mathematically speaking, Power or E...
Francois Poucheret, Lyonel Barthe, Pascal Benoit, ...
IACR
2011
80views more  IACR 2011»
12 years 10 months ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
ICDE
2012
IEEE
232views Database» more  ICDE 2012»
12 years 20 days ago
A Dataset Search Engine for the Research Document Corpus
— A key step in validating a proposed idea or system is to evaluate over a suitable data set. However, to this date there have been no useful tools for researchers to understand ...
Meiyu Lu, Srinivas Bangalore, Graham Cormode, Mari...