Sciweavers

5864 search results - page 212 / 1173
» Can We Work around Numerical Methods
Sort
View
156
Voted
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
15 years 12 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
149
Voted
APWEB
2006
Springer
15 years 8 months ago
Image Description Mining and Hierarchical Clustering on Data Records Using HR-Tree
Since we can hardly get semantics from the low-level features of the image, it is much more difficult to analyze the image than textual information on the Web. Traditionally, textu...
Congle Zhang, Sheng Huang, Gui-Rong Xue, Yong Yu
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 11 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
ECCV
2002
Springer
16 years 6 months ago
Building Roadmaps of Local Minima of Visual Models
Getting trapped in suboptimal local minima is a perennial problem in model based vision, especially in applications like monocular human body tracking where complex nonlinear para...
Cristian Sminchisescu, Bill Triggs
131
Voted
BMCBI
2008
112views more  BMCBI 2008»
15 years 5 months ago
A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regul
Background: Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Al...
Arnab Bhattacharya, Sasha Levy, Adria LeBoeuf, Mic...