Sciweavers

555 search results - page 55 / 111
» Linear decomposition algorithm for VLSI design applications
Sort
View
ICPR
2008
IEEE
16 years 5 months ago
Generic scale-space process for handwriting documents analysis
This paper presents a generic architecture for handwriting documents analysis. It covers all analysis steps from the content description of the document (layout analysis, handwrit...
Guillaume Joutel, Hubert Emptoz, Véronique ...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 4 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
JVCIR
2006
85views more  JVCIR 2006»
15 years 3 months ago
Combining geometrical and textured information to perform image classification
In this paper, we propose a framework to carry out supervised classification of images containing both textured and non textured areas. Our approach is based on active contours. U...
Jean-François Aujol, Tony F. Chan
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui