Sciweavers

8025 search results - page 176 / 1605
» Combinators Introduction: An Algorithm
Sort
View
ICDAR
2003
IEEE
15 years 7 months ago
Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images
A number of techniques have previously been proposed for effective thresholding of document images. In this paper two new thresholding techniques are proposed and compared against...
Graham Leedham, Yan Chen, Kalyan Takru, Joie Hadi ...
IPPS
2003
IEEE
15 years 7 months ago
Task Pool Teams for Implementing Irregular Algorithms on Clusters of SMPs
The characteristics of irregular algorithms make a parallel implementation difficult, especially for PC clusters or clusters of SMPs. These characteristics may include an unpredi...
Judith Hippold, Gudula Rünger
CC
2003
Springer
126views System Software» more  CC 2003»
15 years 7 months ago
Offset Assignment Showdown: Evaluation of DSP Address Code Optimization Algorithms
Abstract. Offset assignment is a highly effective DSP address code optimization technique that has been implemented in a number of ANSI C compilers. In this paper we concentrate on...
Rainer Leupers
CHES
2003
Springer
88views Cryptology» more  CHES 2003»
15 years 7 months ago
A New Algorithm for Switching from Arithmetic to Boolean Masking
To protect a cryptographic algorithm against Differential Power Analysis, a general method consists in masking all intermediate data with a random value. When a cryptographic algo...
Jean-Sébastien Coron, Alexei Tchulkine
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
15 years 7 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry