Sciweavers

1583 search results - page 27 / 317
» Standardization and Competitive Advantage
Sort
View
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
15 years 2 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
ICPP
1998
IEEE
15 years 2 months ago
Improving Parallel-Disk Buffer Management using Randomized Writeback
We address the problems of I/O scheduling and buffer management for general reference strings in a parallel I/O system. Using the standard parallel disk model withD disks and a sh...
Mahesh Kallahalla, Peter J. Varman
ICIP
1999
IEEE
15 years 11 months ago
Error Resilient Lossless Image Coding
We present an image compression scheme that is error resilient and offers lossless decompression in the absence of channel noise. Attempts are made to detect transmission errors a...
Andrew J. Penrose, Neil A. Dodgson
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
15 years 3 months ago
Comparing Search Algorithms for the Temperature Inversion Problem
Several inverse problems exist in the atmospheric sciences that are computationally costly when using traditional gradient based methods. Unfortunately, many standard evolutionary ...
Monte Lunacek, L. Darrell Whitley, Philip Gabriel,...
COLING
2008
14 years 11 months ago
Good Neighbors Make Good Senses: Exploiting Distributional Similarity for Unsupervised WSD
We present an automatic method for senselabeling of text in an unsupervised manner. The method makes use of distributionally similar words to derive an automatically labeled train...
Samuel Brody, Mirella Lapata