Sciweavers

1045 search results - page 32 / 209
» The Use of Exceptions
Sort
View
93
Voted
FSE
1994
Springer
127views Cryptology» more  FSE 1994»
15 years 4 months ago
The RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of da...
Ronald L. Rivest
172
Voted
MCS
2011
Springer
14 years 7 months ago
Endogenous cycles in discontinuous growth models
In this paper we consider a discontinuous one-dimensional piecewise linear model describing a neoclassical growth model. These kind of maps are widely used in the applied context....
Fabio Tramontana, Laura Gardini, Anna Agliari
107
Voted
ICIP
2007
IEEE
16 years 2 months ago
Direct Motion Estimation in the Radon Transform Domain using Match-Profile Backprojections
Integral projections have been proposed as an efficient method to reduce the dimensionality of the search space in motion estimation (ME) algorithms. A number of papers describe m...
Chris Bartels, Gerard de Haan
99
Voted
DEXAW
2002
IEEE
99views Database» more  DEXAW 2002»
15 years 5 months ago
Using Preference Order in Ontologies
The latest ontology languages can be translated into a description logic (DL), thus providing them with a formal semantics and associated reasoning procedures. We introduce the or...
Stijn Heymans, Dirk Vermeir
ISVC
2009
Springer
15 years 7 months ago
Multiple-view Video Coding Using Depth Map in Projective Space
Abstract. In this paper a new video coding by using multiple uncalibrated cameras is proposed. We consider the redundancy between the cameras view points and efficiently compress b...
Nina Yorozu, Yuko Uematsu, Hideo Saito