Sciweavers

2629 search results - page 156 / 526
» complex 2009
Sort
View
EMMCVPR
2009
Springer
15 years 7 months ago
Boundaries as Contours of Optimal Appearance and Area of Support
7th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, Bonn, Germany, August 24-27, 2009 Bayesian boundary models often assume tha...
Christina Pavlopoulou, Stella X. Yu
119
Voted
MODELS
2009
Springer
15 years 5 months ago
Teaching Modeling: Why, When, What?
This paper reports on a panel discussion held during the Educators’ Symposium at MODELS’2009. It shortly explains the context provided for the discussion and outlines the state...
Jean Bézivin, Robert France, Martin Gogolla...
112
Voted
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 4 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
AAIP
2009
15 years 1 months ago
Incremental Learning in Inductive Programming
Inductive programming systems characteristically exhibit an exponential explosion in search time as one increases the size of the programs to be generated. As a way of overcoming ...
Robert Henderson
123
Voted
CIIA
2009
15 years 1 months ago
Web Services Composition Applying MDA
Currently, Web services are available on Internet in a simple and easy way to use. However, a single service can not respond to a predetermined request by user. Thus, it is necessa...
Yamina Hachemi, Mimoun Malki, Djamel Amar Bensaber