Sciweavers

1045 search results - page 32 / 209
» The Use of Exceptions
Sort
View
FSE
1994
Springer
127views Cryptology» more  FSE 1994»
15 years 1 months ago
The RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of da...
Ronald L. Rivest
MCS
2011
Springer
14 years 4 months ago
Endogenous cycles in discontinuous growth models
In this paper we consider a discontinuous one-dimensional piecewise linear model describing a neoclassical growth model. These kind of maps are widely used in the applied context....
Fabio Tramontana, Laura Gardini, Anna Agliari
ICIP
2007
IEEE
15 years 11 months ago
Direct Motion Estimation in the Radon Transform Domain using Match-Profile Backprojections
Integral projections have been proposed as an efficient method to reduce the dimensionality of the search space in motion estimation (ME) algorithms. A number of papers describe m...
Chris Bartels, Gerard de Haan
DEXAW
2002
IEEE
99views Database» more  DEXAW 2002»
15 years 2 months ago
Using Preference Order in Ontologies
The latest ontology languages can be translated into a description logic (DL), thus providing them with a formal semantics and associated reasoning procedures. We introduce the or...
Stijn Heymans, Dirk Vermeir
ISVC
2009
Springer
15 years 4 months ago
Multiple-view Video Coding Using Depth Map in Projective Space
Abstract. In this paper a new video coding by using multiple uncalibrated cameras is proposed. We consider the redundancy between the cameras view points and efficiently compress b...
Nina Yorozu, Yuko Uematsu, Hideo Saito