Sciweavers

1898 search results - page 67 / 380
» Weak Keys for IDEA
Sort
View
ISPEC
2011
Springer
12 years 11 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
MLMI
2004
Springer
14 years 2 months ago
Piecing Together the Emotion Jigsaw
People are emotional, and machines are not. That constrains their communication, and defines a key challenge for the information sciences. Different groups have addressed it from d...
Roddy Cowie, Marc Schröder
HOPL
1993
14 years 25 days ago
A History of C++: 1979-1991
This paper outlines the history of the C++ programming language. The emphasis is on the ideas, constraints, and people that shaped the language, rather than the minutiae of langua...
Bjarne Stroustrup
IPL
1998
177views more  IPL 1998»
13 years 8 months ago
A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation
A common-multiplicand method to the Montgomery algorithm makes an improvement in speed when the right-to-left binary exponentiation is applied. The idea is that the same common pa...
JaeCheol Ha, Sang-Jae Moon
FGR
2008
IEEE
264views Biometrics» more  FGR 2008»
13 years 10 months ago
Large scale learning and recognition of faces in web videos
The phenomenal growth of video on the web and the increasing sparseness of meta information associated with it forces us to look for signals from the video content for search/info...
Ming Zhao 0003, Jay Yagnik, Hartwig Adam, David Ba...