Sciweavers

1191 search results - page 125 / 239
» Completeness and Performance Of The APO Algorithm
Sort
View
COMPSEC
1998
102views more  COMPSEC 1998»
14 years 9 months ago
Reversible data mixing procedure for efficient public-key encryption
This paper describes a data mixing method for encrypting a plaintext block using a block encryption algorithm (such as Elliptic Curve, RSA, etc.) having a block size smaller than ...
Mike Matyas, Mohammad Peyravian, Allen Roginsky, N...
PRL
2007
158views more  PRL 2007»
14 years 9 months ago
Stability and convergence of the level set method in computer vision
Several computer vision problems, like segmentation, tracking and shape modeling, are increasingly being solved using level set methodologies. But the critical issues of stability...
Kunal N. Chaudhury, K. R. Ramakrishnan
KDD
2000
ACM
97views Data Mining» more  KDD 2000»
15 years 1 months ago
Towards an effective cooperation of the user and the computer for classification
Decision trees have been successfully used for the task of classification. However, state-of-the-art algorithms do not incorporate the user in the tree construction process. This ...
Mihael Ankerst, Martin Ester, Hans-Peter Kriegel
DAC
2001
ACM
15 years 11 months ago
Chaff: Engineering an Efficient SAT Solver
Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide practical solutions to ...
Matthew W. Moskewicz, Conor F. Madigan, Ying Zhao,...
DAC
2004
ACM
15 years 11 months ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle