Sciweavers

7978 search results - page 1280 / 1596
» Combining shared-coin algorithms
Sort
View
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
15 years 10 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
169
Voted
GCC
2004
Springer
15 years 10 months ago
Hybrid Performance-Oriented Scheduling of Moldable Jobs with QoS Demands in Multiclusters and Grids
This paper addresses the dynamic scheduling of moldable jobs with QoS demands (soft-deadlines) in multiclusters. A moldable job can be run on a variable number of resources. Three ...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, X...
GECCO
2004
Springer
151views Optimization» more  GECCO 2004»
15 years 10 months ago
Discovery of Human-Competitive Image Texture Feature Extraction Programs Using Genetic Programming
In this paper we show how genetic programming can be used to discover useful texture feature extraction algorithms. Grey level histograms of different textures are used as inputs ...
Brian T. Lam, Victor Ciesielski
ICBA
2004
Springer
271views Biometrics» more  ICBA 2004»
15 years 10 months ago
Enhance the Alignment Accuracy of Active Shape Models Using Elastic Graph Matching
Active Shape Model (ASM) is one of the most popular methods for image alignment. To improve its matching accuracy, in this paper, ASM searching method is combined with a simplifie...
Sanqiang Zhao, Wen Gao, Shiguang Shan, Baocai Yin
150
Voted
ICCS
2004
Springer
15 years 10 months ago
Velocity Field Modelling for Pollutant Plume Using 3-D Adaptive Finite Element Method
Air pollution models usually start from the computation of the velocity field of a fluid. In this paper, we present a model for computing that field based on the contribution of...
Gustavo Montero, Rafael Montenegro, José Ma...
« Prev « First page 1280 / 1596 Last » Next »