Sciweavers

2449 search results - page 331 / 490
» Tensor Embedding Methods
Sort
View
OTM
2007
Springer
15 years 4 months ago
Self-healing in Binomial Graph Networks
The number of processors embedded in high performance computing platforms is growing daily to solve larger and more complex problems. However, as the number of components increases...
Thara Angskun, George Bosilca, Jack Dongarra
100
Voted
PAKDD
2007
ACM
203views Data Mining» more  PAKDD 2007»
15 years 4 months ago
Grammar Guided Genetic Programming for Flexible Neural Trees Optimization
Abstract. In our previous studies, Genetic Programming (GP), Probabilistic Incremental Program Evolution (PIPE) and Ant Programming (AP) have been used to optimal design of Flexibl...
Peng Wu, Yuehui Chen
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
15 years 4 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
SCIA
2007
Springer
118views Image Analysis» more  SCIA 2007»
15 years 4 months ago
Reconstruction of 3D Curves for Quality Control
In the area of quality control by vision, the reconstruction of 3D curves is a convenient tool to detect and quantify possible anomalies. Whereas other methods exist that allow us ...
Hanna Martinsson, François Gaspard, Adrien ...
STACS
2007
Springer
15 years 4 months ago
Hard Metrics from Cayley Graphs of Abelian Groups
: Hard metrics are the class of extremal metrics with respect to embedding into Euclidean spaces: they incur Ω(logn) multiplicative distortion, which is as large as it can possib...
Ilan Newman, Yuri Rabinovich