Sciweavers

2214 search results - page 207 / 443
» complexity 2004
Sort
View
119
Voted
WER
2004
Springer
15 years 8 months ago
Evaluating Methodologies: A Requirements Engineering Approach Through the Use of an Exemplar
Systems development methodologies continue to be a central area of research in software engineering. As the nature of applications and systems usage move increasingly towards open ...
Luiz Marcio Cysneiros, Vera Werneck, Eric S. K. Yu
121
Voted
FOCS
2002
IEEE
15 years 8 months ago
Testing Juntas
We consider the problem of testing functions for the property of being a k-junta (i.e., of depending on at most k variables). Fischer, Kindler, Ron, Safra, and Samorodnitsky (J. Co...
Eldar Fischer, Guy Kindler, Dana Ron, Shmuel Safra...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin
140
Voted
3DPVT
2004
IEEE
104views Visualization» more  3DPVT 2004»
15 years 7 months ago
Interactive Modeling from Dense Color and Sparse Depth
We are developing a system for interactive modeling of real world scenes. The acquisition device consists of a video camera enhanced with an attached laser system. As the operator...
Voicu Popescu, Elisha Sacks, Gleb Bahmutov
110
Voted
ADVIS
2004
Springer
15 years 7 months ago
On Families of New Adaptive Compression Algorithms Suitable for Time-Varying Source Data
In this paper, we introduce a new approach to adaptive coding which utilizes Stochastic Learning-based Weak Estimation (SLWE) techniques to adaptively update the probabilities of t...
Luís G. Rueda, B. John Oommen