Sciweavers

49 search results - page 10 / 10
» Two Remarkable Computational Competencies of the Simple Gene...
Sort
View
ACISP
2004
Springer
13 years 11 months ago
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
The XTR public key system was introduced at Crypto 2000. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead...
Dong-Guk Han, Jongin Lim, Kouichi Sakurai
EACL
2003
ACL Anthology
13 years 7 months ago
Topological Parsing
We present a new grammar formalism for parsing with freer word-order languages, motivated by recent linguistic research in German and the Slavic languages. Unlike CFGs, these gram...
Gerald Penn, Mohammad Haji-Abdolhosseini
ICIG
2009
IEEE
14 years 12 days ago
Image Segmentation Via Iterative Geodesic Averaging
We present a simple and fast method for performing unsupervised segmentation. Our method works by centering a square window on each pixel of the input image. Each pixel is then as...
Asmaa Hosni, Michael Bleyer, Margrit Gelautz
GECCO
2004
Springer
112views Optimization» more  GECCO 2004»
13 years 11 months ago
Some Issues on the Implementation of Local Search in Evolutionary Multiobjective Optimization
This paper discusses the implementation of local search in evolutionary multiobjective optimization (EMO) algorithms for the design of a simple but powerful memetic EMO algorithm. ...
Hisao Ishibuchi, Kaname Narukawa