Sciweavers

10602 search results - page 164 / 2121
» Weakly Useful Sequences
Sort
View
CCS
1997
ACM
15 years 8 months ago
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack
In this paper, we address the following problem: \ Is it possible to weaken/attack a scheme when a (provably) secure cryptosystem is used? ". The answer is yes. We exploit we...
Marc Joye, Jean-Jacques Quisquater
AUTOMATICA
2007
61views more  AUTOMATICA 2007»
15 years 4 months ago
Errors-in-variables methods in system identification
Abstract: The paper gives a survey of errors-in-variables methods in system identification. Background and motivation are given, and examples illustrate why the identification pr...
Torsten Söderström
TIT
2008
106views more  TIT 2008»
15 years 4 months ago
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators
This article describes new theoretical results concerning the general behavior of a Feedback with Carry Shift Register (FCSR) automaton. They help to better understand how the init...
François Arnault, Thierry P. Berger, Marine...
FORTE
2001
15 years 5 months ago
Stepwise Design with Message Sequence Charts
Use cases are useful in various stages of the software process. They are very often described using text that has to be interpreted by system designers. This could lead to implemen...
Ferhat Khendek, Stephan Bourduas, Daniel Vincent
MVA
2007
211views Computer Vision» more  MVA 2007»
15 years 5 months ago
Vision-based UAV Navigation in Mountain Area
Most vision-based UAV (Unmanned Aerial Vehicle) navigation algorithms extract manmade features such as buildings or roads, which are well structured in urban terrain, using the CC...
Jihwan Woo, Kilho Son, Teng Li, Gwan Sung Kim, In-...