Sciweavers

3897 search results - page 188 / 780
» complexity 2010
Sort
View
122
Voted
CVPR
2010
IEEE
15 years 11 months ago
Efficient Histogram-Based Sliding Window
Many computer vision problems rely on computing histogram-based objective functions with a sliding window. A main limiting factor is the high computational cost. Existing computat...
Yichen Wei, Litian Tao
114
Voted
CISIS
2010
IEEE
15 years 9 months ago
On a Journey from Message to Observable Pervasive Application
—Bringing together heterogeneous computing devices and appliances gives rise to a spontaneous environment where resources exchange messages, such as a mobile phone telling the ca...
Geert Vanderhulst, Kris Luyten, Karin Coninx
120
Voted
CTRSA
2010
Springer
212views Cryptology» more  CTRSA 2010»
15 years 9 months ago
Fault Attacks Against emv Signatures
At ches 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (cjknp) exhibited a fault attack against rsa signatures with partially known messages. This attack allows factoring the ...
Jean-Sébastien Coron, David Naccache, Mehdi...
99
Voted
ICDE
2010
IEEE
233views Database» more  ICDE 2010»
15 years 8 months ago
Polynomial heuristics for query optimization
— Research on query optimization has traditionally focused on exhaustive enumeration of an exponential number of candidate plans. Alternatively, heuristics for query optimization...
Nicolas Bruno, César A. Galindo-Legaria, Mi...
101
Voted
AFRICACRYPT
2010
Springer
15 years 7 months ago
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of ...
Praveen Gauravaram, Gaëtan Leurent, Florian M...