Sciweavers

648 search results - page 13 / 130
» Generalized Powering Functions and Their Application to Digi...
Sort
View
ICDAR
2003
IEEE
15 years 2 months ago
An Evolutionary Algorithm for General Symbol Segmentation
A new system is presented for general symbol segmentation, which is applicable for segmentation of any connected string of symbols, including characters and line diagrams. Using a...
Stephen Pearce, Maher Ahmed
PRICAI
2004
Springer
15 years 3 months ago
Power of Brute-Force Search in Strongly-Typed Inductive Functional Programming Automation
Abstract. A successful case of applying brute-force search to functional programming automation is presented and compared with a conventional genetic programming method. From the i...
Susumu Katayama
IH
2005
Springer
15 years 3 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
86
Voted
ISLPED
2003
ACM
152views Hardware» more  ISLPED 2003»
15 years 2 months ago
An MTCMOS design methodology and its application to mobile computing
The Multi-Threshold CMOS (MTCMOS) technology provides a solution to the high performance and low power design requirements of modern designs. While the low Vth transistors are use...
Hyo-Sig Won, Kyo-Sun Kim, Kwang-Ok Jeong, Ki-Tae P...