Sciweavers

253 search results - page 49 / 51
» When More Alternatives Lead to Less Choice
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 1 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
CASES
2004
ACM
14 years 4 days ago
Reducing both dynamic and leakage energy consumption for hard real-time systems
While the dynamic voltage scaling (DVS) techniques are efficient in reducing the dynamic energy consumption for the processor, varying voltage alone becomes less effective for t...
Linwei Niu, Gang Quan
JIT
2004
Springer
131views Database» more  JIT 2004»
14 years 1 days ago
Testing of Service-Oriented Architectures - A Practical Approach
Service Oriented Architectures (SOAs) have recently emerged as a new promising paradigm for supporting distributed computing. Web services, as well as integration-packages relying ...
Schahram Dustdar, Stephan Haslinger
ISCA
2002
IEEE
105views Hardware» more  ISCA 2002»
13 years 11 months ago
Power and Performance Evaluation of Globally Asynchronous Locally Synchronous Processors
Due to shrinking technologies and increasing design sizes, it is becoming more difficult and expensive to distribute a global clock signal with low skew throughout a processor di...
Anoop Iyer, Diana Marculescu
ICB
2007
Springer
207views Biometrics» more  ICB 2007»
13 years 10 months ago
Super-Resolved Faces for Improved Face Recognition from Surveillance Video
Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...