Sciweavers

7326 search results - page 1420 / 1466
» Methods for modalities 3
Sort
View
ICISC
1998
110views Cryptology» more  ICISC 1998»
15 years 1 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
NIPS
2000
15 years 1 months ago
Learning Continuous Distributions: Simulations With Field Theoretic Priors
Learning of a smooth but nonparametric probability density can be regularized using methods of Quantum Field Theory. We implement a field theoretic prior numerically, test its eff...
Ilya Nemenman, William Bialek
PDPTA
2000
15 years 1 months ago
Evaluation of Neural and Genetic Algorithms for Synthesizing Parallel Storage Schemes
Exploiting compile time knowledge to improve memory bandwidth can produce noticeable improvements at run-time [13, 1]. Allocating the data structure [13] to separate memories when...
Mayez A. Al-Mouhamed, Husam Abu-Haimed
NIPS
1997
15 years 1 months ago
Bayesian Model of Surface Perception
Image intensity variations can result from several different object surface effects, including shading from 3-dimensional relief of the object, or paint on the surface itself. An ...
William T. Freeman, Paul A. Viola
TAMODIA
2007
15 years 1 months ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
« Prev « First page 1420 / 1466 Last » Next »