Sciweavers

940 search results - page 51 / 188
» New Cryptanalytic Results on IDEA
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 9 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
CGF
1999
79views more  CGF 1999»
14 years 9 months ago
Stochastic Iteration for Non-diffuse Global Illumination
This paper presents a single-pass, view-dependent method to solve the rendering equation, using a stochastic iterational scheme where the transport operator is selected randomly i...
László Szirmay-Kalos
TIT
2010
111views Education» more  TIT 2010»
14 years 4 months ago
Directly lower bounding the information capacity for channels with I.I.D.deletions and duplications
We directly lower bound the information capacity for channels with i.i.d. deletions and duplications. Our approach differs from previous work in that we focus on the information ca...
Adam Kirsch, Eleni Drinea
CHINZ
2005
ACM
14 years 11 months ago
Graphical abstract help
re the use of abstracted screenshots as part of a new help interface. Graphstract, an implementation of a graphical help system, extends the ideas of textually oriented Minimal Ma...
Jeff Huang, Bo Lu, Michael B. Twidale
JIFS
2006
120views more  JIFS 2006»
14 years 9 months ago
Building similarity metrics reflecting utility in case-based reasoning
Fundamental to case-based reasoning is the idea that similar problems have similar solutions. The meaning of the concept of "similarity" can vary in different situations...
Ning Xiong, Peter Funk