Sciweavers

4488 search results - page 342 / 898
» Focusing Search by Using Problem Solving Experience
Sort
View
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
SIAMJO
2010
97views more  SIAMJO 2010»
14 years 11 months ago
A Newton-CG Augmented Lagrangian Method for Semidefinite Programming
Abstract. We consider a Newton-CG augmented Lagrangian method for solving semidefinite programming (SDP) problems from the perspective of approximate semismooth Newton methods. In ...
Xin-Yuan Zhao, Defeng Sun, Kim-Chuan Toh
152
Voted
COMPGEOM
1995
ACM
15 years 8 months ago
How Good are Convex Hull Algorithms?
A convex polytope P can be speci ed in two ways: as the convex hull of the vertex set V of P, or as the intersection of the set H of its facet-inducing halfspaces. The vertex enum...
David Avis, David Bremner
155
Voted
ICCBR
2001
Springer
15 years 9 months ago
Meta-case-Based Reasoning: Using Functional Models to Adapt Case-Based Agents
It is useful for an intelligent software agent to be able to adapt to new demands from an environment. Such adaptation can be viewed as a redesign problem; an agent has some origin...
J. William Murdock, Ashok K. Goel
IJCV
1998
109views more  IJCV 1998»
15 years 4 months ago
Robust Optic Flow Computation
This paper formulates the optic flow problem as a set of over-determined simultaneous linear equations. It then introduces and studies two new robust optic flow methods. The fir...
Alireza Bab-Hadiashar, David Suter