Sciweavers

1789 search results - page 58 / 358
» New analysis and results for the Frank-Wolfe method
Sort
View
IACR
2011
243views more  IACR 2011»
13 years 9 months ago
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers
The block cipher family for lightweight devices, KTANTAN, is analyzed in this paper. We propose a new cryptanalysis method which improves results of Meet-in-the-Middle attacks on K...
Bo Zhu, Guang Gong
PLDI
2000
ACM
15 years 2 months ago
Field analysis: getting useful and low-cost interprocedural information
We present a new limited form of interprocedural analysis called field analysis that can be used by a compiler to reduce the costs of modern language features such as objectorien...
Sanjay Ghemawat, Keith H. Randall, Daniel J. Scale...
CVPR
2007
IEEE
15 years 11 months ago
Optimal Dimensionality Discriminant Analysis and Its Application to Image Recognition
Dimensionality reduction is an important issue when facing high-dimensional data. For supervised dimensionality reduction, Linear Discriminant Analysis (LDA) is one of the most po...
Feiping Nie, Shiming Xiang, Yangqiu Song, Changshu...
FGR
2008
IEEE
141views Biometrics» more  FGR 2008»
15 years 4 months ago
Markerless view independent gait analysis with self-camera calibration
We present a new method for viewpoint independent markerless gait analysis. The system uses a single camera, does not require camera calibration and works with a wide range of dir...
Michela Goffredo, Richard D. Seely, John N. Carter...
APSEC
2006
IEEE
15 years 3 months ago
Project Replayer with Email Analysis - Revealing Contexts in Software Development
In many software development projects, people tend to repeat same mistakes due to lack of shared knowledge from past experiences. Generally, it is very difficult to manually find ...
Kimiharu Okura, Keita Goto, Noriko Hanakawa, Shinj...