Sciweavers

2340 search results - page 56 / 468
» Second quarter 2008
Sort
View
AFRICACRYPT
2009
Springer
15 years 6 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
CEC
2008
IEEE
15 years 6 months ago
Multi-level neutrality in optimization
Abstract— This paper explores the idea of neutrality in heuristic optimization algorithms. In particular, the effect of having multiple levels of neutrality in representations is...
Colin G. Johnson
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
15 years 6 months ago
Robust Data Exchange for Unreliable P2P Networks
The aim of this work is to provide a robust way for peers with heterogeneous data sources to exchange information in an unreliable network. We address this problem in two ways. Fi...
Duc Minh Le, Andrew Smith, Peter McBrien
ICASSP
2008
IEEE
15 years 6 months ago
A fast approximate joint diagonalization algorithm using a criterion with a block diagonal weight matrix
We propose a new algorithm for Approximate Joint Diagonalization (AJD) with two main advantages over existing state-of-the-art algorithms: Improved overall running speed, especial...
Petr Tichavský, Arie Yeredor, Jan Nielsen
ICIP
2008
IEEE
15 years 6 months ago
Decomposition of branching volume data by tip detection
We present an approach to decomposing branching volume data into sub-branches. First, a metric is proposed for evaluating local convexities in volumetric data, and it is a criteri...
Wei Ma, Bo Xiang, Xiaopeng Zhang, Hongbin Zha