Sciweavers

1696 search results - page 121 / 340
» Permuted function matching
Sort
View
CVPR
2004
IEEE
16 years 25 days ago
A GMM Parts Based Face Representation for Improved Verification through Relevance Adaptation
Motivated by the success of parts based representations in face detection we have attempted to address some of the problems associated with applying such a philosophy to the task ...
Simon Lucey, Tsuhan Chen
TLCA
2009
Springer
15 years 5 months ago
Session-Based Communication Optimisation for Higher-Order Mobile Processes
In this paper we solve an open problem posed in our previous work on asynchronous subtyping [12], extending the method to higher-order session communication and functions. Our syst...
Dimitris Mostrous, Nobuko Yoshida
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
15 years 5 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
SACRYPT
2007
Springer
15 years 4 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer
CORR
2008
Springer
90views Education» more  CORR 2008»
14 years 11 months ago
An Indirect Genetic Algorithm for Set Covering Problems
This paper presents a new type of genetic algorithm for the set covering problem. It differs from previous evolutionary approaches first because it is an indirect algorithm, i.e. ...
Uwe Aickelin