Sciweavers

5580 search results - page 777 / 1116
» Randomized priority algorithms
Sort
View
90
Voted
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 7 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
107
Voted
GECCO
2006
Springer
146views Optimization» more  GECCO 2006»
15 years 7 months ago
The dispersion metric and the CMA evolution strategy
An algorithm independent metric is introduced that measures the dispersion of a uniform random sample drawn from the top ranked percentiles of the search space. A low dispersion f...
Monte Lunacek, Darrell Whitley
147
Voted
ICMCS
2000
IEEE
122views Multimedia» more  ICMCS 2000»
15 years 7 months ago
Optimal Streaming of Layer-Encoded Multimedia Presentations
In the context of communication networks with no QoS guarantees, we describe the problem of streaming layer encoded multimedia presentation data as a two-phase decision problem. W...
David A. Turner, Keith W. Ross
165
Voted
IJCNN
2000
IEEE
15 years 7 months ago
A Training Method with Small Computation for Classification
A training data selection method for multi-class data is proposed. This method can be used for multilayer neural networks (MLNN). The MLNN can be applied to pattern classification...
Kazuyuki Hara, Kenji Nakayama
119
Voted
DAC
1995
ACM
15 years 7 months ago
Register Allocation and Binding for Low Power
This paper describes a technique for calculating the switching activity of a set of registers shared by di erent data values. Based on the assumption that the joint pdf (probabili...
Jui-Ming Chang, Massoud Pedram