Sciweavers

6693 search results - page 1062 / 1339
» Methods of Automatic Algorithm Generation
Sort
View
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 8 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
126
Voted
CAD
2007
Springer
15 years 3 months ago
Direct extraction of surface meshes from implicitly represented heterogeneous volumes
This paper describes a novel algorithm to extract surface meshes directly from implicitly represented heterogeneous models made of different constituent materials. Our approach ca...
Charlie C. L. Wang
MMM
2011
Springer
244views Multimedia» more  MMM 2011»
14 years 7 months ago
Shape Stylized Face Caricatures
Facial caricatures exaggerate key features to emphasize unique structural and personality traits. It is quite a challenge to retain the identity of the original person despite the ...
Nguyen Kim Hai Le, Why Yong Peng, Golam Ashraf
ECCV
2008
Springer
16 years 5 months ago
Segmentation and Recognition Using Structure from Motion Point Clouds
We propose an algorithm for semantic segmentation based on 3D point clouds derived from ego-motion. We motivate five simple cues designed to model specific patterns of motion and 3...
Gabriel J. Brostow, Jamie Shotton, Julien Fauqueur...
146
Voted
WWW
2009
ACM
16 years 4 months ago
Learning to recognize reliable users and content in social media with coupled mutual reinforcement
Community Question Answering (CQA) has emerged as a popular forum for users to pose questions for other users to answer. Over the last few years, CQA portals such as Naver and Yah...
Jiang Bian, Yandong Liu, Ding Zhou, Eugene Agichte...
« Prev « First page 1062 / 1339 Last » Next »