Sciweavers

12459 search results - page 140 / 2492
» cans 2006
Sort
View
IJBC
2006
80views more  IJBC 2006»
15 years 4 months ago
Return-Map Cryptanalysis Revisited
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes. Recently, a simple defen...
Shujun Li, Guanrong Chen, Gonzalo Álvarez
IJCSA
2006
77views more  IJCSA 2006»
15 years 4 months ago
Formal Approach for the Coherence Control of SMIL Documents
This paper presents a formal approach based on Time Petri net (TPN) for the coherence control of SMIL documents. TPN model has been widely used to specify real time systems. The q...
S. Mazouz, D. Dahmani, L. Kaddouri
IJCV
2006
158views more  IJCV 2006»
15 years 4 months ago
3D Structure Recovery and Unwarping of Surfaces Applicable to Planes
The deformation of applicable surfaces such as sheets of paper satisfies the differential geometric constraints of isometry (lengths and areas are conserved) and vanishing Gaussia...
Nail A. Gumerov, Ali Zandifar, Ramani Duraiswami, ...
IJDE
2006
77views more  IJDE 2006»
15 years 4 months ago
Hidden Disk Areas: HPA and DCO
This paper focuses on certain manufacturer hidden areas of a hard disk, specifically Host Protected Areas (HPA) and Device Configuration Overlays (DCO). These areas can be problem...
Mayank R. Gupta, Michael D. Hoeschele, Marcus K. R...
IJET
2006
43views more  IJET 2006»
15 years 4 months ago
An investigation of using the computer for reading and writing in the English classroom in secondary schools in the UK
This paper presents an investigation of using the computer in English teaching at the secondary school in the UK, particularly in respect of reading and writing skills. Many studie...
Bin Zou