Sciweavers

533 search results - page 51 / 107
» A Very Mathematical Dilemma
Sort
View
SYNASC
2005
IEEE
110views Algorithms» more  SYNASC 2005»
15 years 5 months ago
Performance Tuning of Evolutionary Algorithms Using Particle Sub Swarms
Particle Swarm Optimization (PSO) technique proved its ability to deal with very complicated optimization and search problems. This paper proposes a new particle swarm variant whi...
Crina Grosan, Ajith Abraham, Monica Nicoara
ARITH
1997
IEEE
15 years 4 months ago
On the Design of IEEE Compliant Floating Point Units
Engineering design methodology recommends designing a system as follows: Start with an unambiguous speci cation, partition the system into blocks, specify the functionality of eac...
Guy Even, Wolfgang J. Paul
CVPR
1997
IEEE
15 years 4 months ago
Deformable Multi Template Matching with Application to Portal Images
The exact positioning of patients during radiotherapy is essential for high precision treatment. The registration of portal image sequences can help to control the patient positio...
Martin Berger, Gaudenz Danuser
EUROCRYPT
2006
Springer
15 years 3 months ago
Symplectic Lattice Reduction and NTRU
NTRU is a very efficient public-key cryptosystem based on polynomial arithmetic. Its security is related to the hardness of lattice problems in a very special class of lattices. Th...
Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguye...
FC
2010
Springer
226views Cryptology» more  FC 2010»
15 years 3 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena