Sciweavers

7121 search results - page 1211 / 1425
» Functions as Session-Typed Processes
Sort
View
CEC
2011
IEEE
14 years 4 months ago
Curiosity-driven optimization
— The principle of artificial curiosity directs active exploration towards the most informative or most interesting data. We show its usefulness for global black box optimizatio...
Tom Schaul, Yi Sun, Daan Wierstra, Faustino J. Gom...
CIKM
2011
Springer
14 years 4 months ago
How to carry over historic books into social networks
This paper describes how to make use of e-books that look like printed books in a knowledge network. After an overview of digitalization efforts and current digital library initia...
Heimo Müller, Hermann A. Maurer
DSN
2011
IEEE
14 years 4 months ago
Modeling time correlation in passive network loss tomography
—We consider the problem of inferring link loss rates using passive measurements. Prior inference approaches are mainly built on the time correlation nature of packet losses. How...
Jin Cao, Aiyou Chen, Patrick P. C. Lee
IACR
2011
252views more  IACR 2011»
14 years 4 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
ICDAR
2011
IEEE
14 years 4 months ago
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther
—We propose a novel method to evaluate table segmentation results based on a table image ground truther. In the ground-truthing process, we first extract connected components fr...
Yanhui Liang, Yizhou Wang, Eric Saund
« Prev « First page 1211 / 1425 Last » Next »