Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
It is difficult to learn good classifiers when training data is missing attribute values. Conventional techniques for dealing with such omissions, such as mean imputation, general...
Xiaoyuan Su, Taghi M. Khoshgoftaar, Russell Greine...
Numerical integration is an operation that is frequently available in multiple precision numerical software packages. The different quadrature schemes used are considered well stu...
As part of the general growth and diversification of media in different modalities, the presence of information in the form of human speech in the world-wide body of digital conte...
— Event-driven spike-based processing systems offer new possibilities for real-time vision. Signals are encoded asynchronously in time thus preserving the time information of the...