Sciweavers

453 search results - page 60 / 91
» date 2006
Sort
View
85
Voted
DIAL
2006
IEEE
129views Image Analysis» more  DIAL 2006»
15 years 1 months ago
Ink recognition based on statistical classification methods
Statistical classification methods can be applied on images of historical manuscript in order to characterize the various kinds of inks used. As these methods do not require destr...
Vasiliki Kokla, Alexandra Psarrou, Vassilis Konsta...
72
Voted
ERCIMDL
2006
Springer
131views Education» more  ERCIMDL 2006»
15 years 1 months ago
Repository Replication Using NNTP and SMTP
We present the results of a feasibility study using shared, existing, network-accessible infrastructure for repository replication. We utilize the SMTP and NNTP protocols to replic...
Joan A. Smith, Martin Klein, Michael L. Nelson
64
Voted
FSE
2006
Springer
121views Cryptology» more  FSE 2006»
15 years 1 months ago
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographi...
John Black
89
Voted
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
15 years 1 months ago
Incorporating directional information within a differential evolution algorithm for multi-objective optimization
The field of Differential Evolution (DE) has demonstrated important advantages in single objective optimization. To date, no previous research has explored how the unique characte...
Antony W. Iorio, Xiaodong Li
AUTOMATICA
2006
80views more  AUTOMATICA 2006»
14 years 10 months ago
Pursuit formations of unicycles
In this paper, the stability of equilibrium formations for multiple unicycle systems in cyclic pursuit is studied in detail. The cyclic pursuit setup is particularly simple in tha...
Joshua A. Marshall, Mireille E. Broucke, Bruce A. ...