Sciweavers

375 search results - page 60 / 75
» Making Abstract Machines Less Abstract
Sort
View
78
Voted
ECCV
1992
Springer
16 years 5 days ago
Determining Three-Dimensional Shape from Orientation and Spatial Frequency Disparities
Abstract. Binocular di erences in orientation and foreshortening are systematically related to surface slant and tilt and could potentially be exploited by biological and machine v...
David G. Jones, Jitendra Malik
ACNS
2009
Springer
157views Cryptology» more  ACNS 2009»
15 years 5 months ago
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis
Abstract. Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-dete...
Lei Liu, Songqing Chen
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 2 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
AISB
1994
Springer
15 years 2 months ago
Formal Memetic Algorithms
Abstract. A formal, representation-independent form of a memetic algorithm-a genetic algorithm incorporating local search--is introduced. A generalisedform of N-point crossover is ...
Nicholas J. Radcliffe, Patrick D. Surry
TMC
2002
106views more  TMC 2002»
14 years 10 months ago
Optimal Resource Management in Wireless Multimedia Wideband CDMA Systems
This paper proposes a scheme of optimal resource management for reverse-link transmissions in multimedia wideband code-division multiple-access (WCDMA) communications. It is to gua...
Majid Soleimanipour, Weihua Zhuang, George H. Free...