Sciweavers

6881 search results - page 156 / 1377
» Motivation
Sort
View
WCC
2005
Springer
117views Cryptology» more  WCC 2005»
15 years 10 months ago
Interpolation of Functions Related to the Integer Factoring Problem
The security of the RSA public key cryptosystem depends on the intractability of the integer factoring problem. This paper shall give some theoretical support to the assumption of ...
Clemens Adelmann, Arne Winterhof
136
Voted
EVOW
2005
Springer
15 years 10 months ago
A Multistage Approach to Cooperatively Coevolving Feature Construction and Object Detection
In previous work, we showed how cooperative coevolution could be used to evolve both the feature construction stage and the classification stage of an object detection algorithm. ...
Mark E. Roberts, Ela Claridge
MM
2004
ACM
81views Multimedia» more  MM 2004»
15 years 10 months ago
Interactive manipulation of replay speed while listening to speech recordings
Today’s interfaces for time-scaled audio replay have limitations especially regarding highly interactive tasks such as skimming and searching, which require quick temporary spee...
Wolfgang Hürst, Tobias Lauer, Georg Götz
142
Voted
ANTS
2004
Springer
121views Algorithms» more  ANTS 2004»
15 years 10 months ago
Function Field Sieve in Characteristic Three
In this paper we investigate the efficiency of the function field sieve to compute discrete logarithms in the finite fields F3n . Motivated by attacks on identity based encrypti...
Robert Granger, Andrew J. Holt, Dan Page, Nigel P....
AOSE
2004
Springer
15 years 10 months ago
Enacting and Deacting Roles in Agent Programming
In the paper we study the dynamics of roles played by agents in multiagent systems. We capture role dynamics in terms of four operation performed by agents: ‘enactment’, ‘dea...
Mehdi Dastani, Birna van Riemsdijk, Joris Hulstijn...