Sciweavers

1287 search results - page 99 / 258
» Self-Normalized Linear Tests
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 21 days ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
IMAGING
2001
15 years 21 days ago
Spherical Sampling and Color Transformations
In this paper, we present a spherical sampling technique that can be employed to find optimal sensors for trichromatic color applications. The advantage over other optimization te...
Graham D. Finlayson, Sabine Süsstrunk
ESANN
2003
15 years 21 days ago
RetinotopicNET: An Efficient Simulator for Retinotopic Visual Architectures
: -RetinotopicNET is an efficient simulator for neural networks with retinotopic-like receptive fields. The system has two main characteristics: it is event-driven and it takes adv...
Raul Cristian Muresan
NAACL
2004
15 years 21 days ago
Improvements in Phrase-Based Statistical Machine Translation
In statistical machine translation, the currently best performing systems are based in some way on phrases or word groups. We describe the baseline phrase-based translation system...
Richard Zens, Hermann Ney
NAACL
2003
15 years 20 days ago
Semantic Language Models for Topic Detection and Tracking
In this work, we present a new semantic language modeling approach to model news stories in the Topic Detection and Tracking (TDT) task. In the new approach, we build a unigram la...
Ramesh Nallapati