Sciweavers

IJIT
2004
13 years 7 months ago
An Evolutionary Algorithm to Solve Cryptarithmetic Problem
Cryptarithmetic problem is an interesting constraint satisfaction problem for which different algorithms have been given. But none of them can solve the problem intelligently using...
Abu Sayef Md. Ishaque, Md. Bahlul Haider, Muhammad...
TCC
2004
Springer
835views Cryptology» more  TCC 2004»
13 years 11 months ago
On the Possibility of One-Message Weak Zero-Knowledge
Abstract. We investigate whether it is possible to obtain any meaningful type of zero-knowledge proofs using a one-message (i.e., noninteractive) proof system. We show that, under ...
Boaz Barak, Rafael Pass
ECCV
2004
Springer
14 years 8 months ago
High Accuracy Optical Flow Estimation Based on a Theory for Warping
Abstract. We study an energy functional for computing optical flow that combines three assumptions: a brightness constancy assumption, a gradient constancy assumption, and a discon...
Thomas Brox, Andrés Bruhn, Nils Papenberg, ...
ICPR
2004
IEEE
14 years 7 months ago
Sketched Symbol Recognition using Zernike Moments
A. Richard Newton, Heloise Hwawen Hse
OSDI
2004
ACM
14 years 6 months ago
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code
Copy-pasted code is very common in large software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Recent studies show that copy-paste...
Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
All Subjects
Top of PageReset Settings