Sciweavers

16218 search results - page 3173 / 3244
» Standards
Sort
View
LATINCRYPT
2010
14 years 10 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
MA
2010
Springer
135views Communications» more  MA 2010»
14 years 10 months ago
Nonparametric comparison of regression functions
In this work we provide a new methodology for comparing regression functions m1 and m2 from two samples. Since apart from smoothness no other (parametric) assumptions are required...
Ramidha Srihera, Winfried Stute
MAMMO
2010
Springer
14 years 10 months ago
Introducing a Novel Image Quality Measure for Digital Phase-Contrast-Image Evaluation
Recently, detective quantum efficiency (DQE) arising from the concept of signal-to-noise ratio (SNR) has been used for assessing digital x-ray imaging systems. Using a phase-shift ...
Satoru Matsuo, Hiroshi Fujita, Junji Morishita, Te...
MMMACNS
2010
Springer
14 years 10 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...
PAMI
2010
215views more  PAMI 2010»
14 years 10 months ago
Fusion Moves for Markov Random Field Optimization
—The efficient application of graph cuts to Markov Random Fields (MRFs) with multiple discrete or continuous labels remains an open question. In this paper, we demonstrate one p...
Victor S. Lempitsky, Carsten Rother, Stefan Roth, ...
« Prev « First page 3173 / 3244 Last » Next »