Sciweavers

2745 search results - page 195 / 549
» A fast algorithm for computing large Fibonacci numbers
Sort
View
111
Voted
IEEECGIV
2006
IEEE
15 years 10 months ago
On Choosing Wavelet Resolution in Image Deblurring
In wavelet deblurring of noisy images the finest resolution levels are key parameters which require fine tuning. In this paper we present a blockwise thresholding rule in the Fo...
Laurent Cavalier, Marc Raimondo
GD
2000
Springer
15 years 7 months ago
GRIP: Graph dRawing with Intelligent Placement
Abstract. This paper describes a system for Graph dRawing with Intelligent Placement, GRIP. The GRIP system is designed for drawing large graphs and uses a novel multi-dimensional ...
Pawel Gajer, Stephen G. Kobourov
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 10 months ago
A Genetic Approach to Multivariate Microaggregation for Database Privacy
Microaggregation is a technique used to protect privacy in databases and location-based services. We propose a new hybrid technique for multivariate microaggregation. Our techniqu...
Antoni Martínez-Ballesté, Agusti Sol...
GECCO
2009
Springer
156views Optimization» more  GECCO 2009»
15 years 10 months ago
Characterizing the genetic programming environment for fifth (GPE5) on a high performance computing cluster
Solving complex, real-world problems with genetic programming (GP) can require extensive computing resources. However, the highly parallel nature of GP facilitates using a large n...
Kenneth Holladay
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 8 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap