Sciweavers

2370 search results - page 233 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
EURODAC
1994
IEEE
116views VHDL» more  EURODAC 1994»
15 years 8 months ago
A performance evaluator for parameterized ASIC architectures
System-levelpartitioning assigns functionalobjects such as tasks or code segments to system-level components such as o-the-shelf processors or application-speci c architectures in...
Jie Gong, Daniel D. Gajski, Alex Nicolau
DBPL
2007
Springer
101views Database» more  DBPL 2007»
15 years 8 months ago
Efficient Inclusion for a Class of XML Types with Interleaving and Counting
Inclusion between XML types is important but expensive, and is much more expensive when unordered types are considered. We prove here that inclusion for XML types with interleavin...
Giorgio Ghelli, Dario Colazzo, Carlo Sartiani
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 8 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
ECAI
2004
Springer
15 years 7 months ago
Instance-Based Prediction with Guaranteed Confidence
Instance-based learning (IBL) algorithms have proved to be successful in many applications. However, as opposed to standard statistical methods, a prediction in IBL is usually give...
Eyke Hüllermeier
FGR
2004
IEEE
212views Biometrics» more  FGR 2004»
15 years 7 months ago
Automatic 3D Face Recognition Combining Global Geometric Features with Local Shape Variation Information
Face recognition is a focused issue in pattern recognition over the past decades. In this paper, we have proposed a new scheme for face recognition using 3D information. In this s...
Chenghua Xu, Yunhong Wang, Tieniu Tan, Long Quan