Sciweavers

2711 search results - page 389 / 543
» Convergence of the Wake-Sleep Algorithm
Sort
View
91
Voted
ESORICS
2004
Springer
15 years 3 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
85
Voted
FORMATS
2004
Springer
15 years 3 months ago
Lazy Approximation for Dense Real-Time Systems
We propose an effective and complete method for verifying safety and properties of timed systems, which is based on predicate abstraction for g finite abstractions of timed autom...
Maria Sorea
IMR
2004
Springer
15 years 3 months ago
Inverse Pre-Deformation of Finite Element Mesh for Large Deformation Analysis
In the finite element analysis that deals with large deformation, the process usually produces distorted elements at the later stages of the analysis. These distorted elements lea...
Arbtip Dheeravongkit, Kenji Shimada
63
Voted
3DIM
2003
IEEE
15 years 3 months ago
A Fast Point-to-Tangent Plane Technique for Multi-view Registration
This paper addresses a registration refinement problem and presents an accurate and fast Point-to-(Tangent) Plane technique. Point-to-Plane approach is known to be very accurate ...
Soon-Yong Park, Murali Subbarao
ICNP
2003
IEEE
15 years 3 months ago
Optimal Resource Allocation in Overlay Multicast
This paper targets the problem of optimal resource allocation in overlay multicast, which poses both theoretical and practical challenges. Theoretically, resource allocation among...
Yi Cui, Yuan Xue, Klara Nahrstedt