Sciweavers

389 search results - page 29 / 78
» Computational Alternatives to Random Number Generators
Sort
View
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 4 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
88
Voted
TWC
2008
133views more  TWC 2008»
14 years 9 months ago
Beam Selection Strategies for Orthogonal Random Beamforming in Sparse Networks
Abstract--Orthogonal random beamforming (ORB) constitutes a mean to exploit spatial multiplexing and multi-user diversity (MUD) gains in multi-antenna broadcast channels. To do so,...
José López Vicario, Roberto Bosisio,...
ICDE
2007
IEEE
128views Database» more  ICDE 2007»
15 years 11 months ago
DeltaSky: Optimal Maintenance of Skyline Deletions without Exclusive Dominance Region Generation
This paper addresses the problem of efficient maintenance of a materialized skyline view in response to skyline removals. While there has been significant progress on skyline quer...
Ping Wu, Divyakant Agrawal, Ömer Egecioglu, A...
98
Voted
AAAI
2008
15 years 8 hour ago
Exploiting Causal Independence Using Weighted Model Counting
Previous studies have demonstrated that encoding a Bayesian network into a SAT-CNF formula and then performing weighted model counting using a backtracking search algorithm can be...
Wei Li 0002, Pascal Poupart, Peter van Beek
CRIWG
2007
14 years 11 months ago
Coordinating Multi-task Environments Through the Methodology of Relations Graph
Abstract. This paper presents Relations Graph – GR a methodology to automate the generation of coordination mechanisms in computational environments. GR explores encapsulation an...
Adailton José Alves Da Cruz, Léo Pin...