Sciweavers

1631 search results - page 221 / 327
» Observing Functional Logic Computations
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 1 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
IPMI
2003
Springer
15 years 10 months ago
A Unified Variational Approach to Denoising and Bias Correction in MR
Abstract. We propose a novel bias correction method for magnetic resonance (MR) imaging that uses complementary body coil and surface coil images. The former are spatially homogene...
Ayres C. Fan, William M. Wells III, John W. Fisher...
ICC
2007
IEEE
15 years 4 months ago
On the Accuracy of the Gaussian Approximation for Performance Estimation in Optical DPSK Systems with In-Band Crosstalk
The Gaussian approximation is known to be quite accurate for estimating the system performance of an optically pre–amplified on-off keying (OOK) system in the presence of multipl...
Luís G. C. Cancela, João J. O. Pires
DAS
2004
Springer
15 years 3 months ago
Automatic Fax Routing
Abstract. We present a system for automatic FAX routing which processes incoming FAX images and forwards them to the correct email alias. The system first performs optical charact...
Paul A. Viola, James Rinker, Martin Law
GECCO
2010
Springer
162views Optimization» more  GECCO 2010»
15 years 2 months ago
Heuristics for sampling repetitions in noisy landscapes with fitness caching
For many large-scale combinatorial search/optimization problems, meta-heuristic algorithms face noisy objective functions, coupled with computationally expensive evaluation times....
Forrest Stonedahl, Susa H. Stonedahl