Sciweavers

27827 search results - page 5079 / 5566
» Generating
Sort
View
CRYPTO
2004
Springer
119views Cryptology» more  CRYPTO 2004»
15 years 10 months ago
Security of Random Feistel Schemes with 5 or More Rounds
We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby...
Jacques Patarin
150
Voted
DSMML
2004
Springer
15 years 10 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
ECAI
2004
Springer
15 years 10 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
ECCV
2004
Springer
15 years 10 months ago
Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonics
Abstract. We propose a new method for face recognition under arbitrary pose and illumination conditions, which requires only one training image per subject. Furthermore, no limitat...
Lei Zhang 0002, Dimitris Samaras
EMSOFT
2004
Springer
15 years 10 months ago
Binary translation to improve energy efficiency through post-pass register re-allocation
Energy efficiency is rapidly becoming a first class optimization parameter for modern systems. Caches are critical to the overall performance and thus, modern processors (both hig...
Kun Zhang, Tao Zhang, Santosh Pande
« Prev « First page 5079 / 5566 Last » Next »