Sciweavers

5100 search results - page 881 / 1020
» The Linear Complexity of a Graph
Sort
View
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
15 years 8 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
GECCO
2000
Springer
168views Optimization» more  GECCO 2000»
15 years 8 months ago
A Fault-tolerant Multicast Routing Algorithm in ATM Networks
This paper presents a genetic algorithm based method to solve the capacity and routing assignment problem arising in the design of selfhealing networks using the Virtual Path (VP)...
Sam Kwong, S. S. Chan
ITC
2000
IEEE
84views Hardware» more  ITC 2000»
15 years 8 months ago
Non-intrusive BIST for systems-on-a-chip
1 The term "functional BIST" describes a test method to control functional modules so that they generate a deterministic test set, which targets structural faults within ...
Silvia Chiusano, Paolo Prinetto, Hans-Joachim Wund...
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
15 years 8 months ago
Mining asynchronous periodic patterns in time series data
Periodicy detection in time series data is a challenging problem of great importance in many applications. Most previous work focused on mining synchronous periodic patterns and d...
Jiong Yang, Wei Wang 0010, Philip S. Yu
CAIP
1995
Springer
137views Image Analysis» more  CAIP 1995»
15 years 8 months ago
Extending the Point Distribution Model Using Polar Coordinates
The Point Distribution Model (PDM) has already proved useful for many tasks involving the location or tracking of deformable objects. A principal limitation lies in the fact that n...
Tony Heap, David Hogg