Sciweavers

1024 search results - page 96 / 205
» Value complete, column complete, predicate complete
Sort
View
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
15 years 8 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
ICTAI
2008
IEEE
15 years 8 months ago
Using Imputation Techniques to Help Learn Accurate Classifiers
It is difficult to learn good classifiers when training data is missing attribute values. Conventional techniques for dealing with such omissions, such as mean imputation, general...
Xiaoyuan Su, Taghi M. Khoshgoftaar, Russell Greine...
ARITH
2007
IEEE
15 years 8 months ago
Accurate Multiple-Precision Gauss-Legendre Quadrature
Numerical integration is an operation that is frequently available in multiple precision numerical software packages. The different quadrature schemes used are considered well stu...
Laurent Fousse
DEXAW
2007
IEEE
125views Database» more  DEXAW 2007»
15 years 8 months ago
Ontology-Based Retrieval of Human Speech
As part of the general growth and diversification of media in different modalities, the presence of information in the form of human speech in the world-wide body of digital conte...
Javier Tejedor, Roberto García, Miriam Fern...
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
15 years 8 months ago
Quantifying Input and Output Spike Statistics of a Winner-Take-All Network in a Vision System
— Event-driven spike-based processing systems offer new possibilities for real-time vision. Signals are encoded asynchronously in time thus preserving the time information of the...
Matthias Oster, Rodney J. Douglas, Shih-Chii Liu