Sciweavers

681 search results - page 109 / 137
» et 2006
Sort
View
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 1 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
15 years 1 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén
GECCO
2006
Springer
116views Optimization» more  GECCO 2006»
15 years 1 months ago
A crossover for complex building blocks overlapping
We propose a crossover method to combine complexly overlapping building blocks (BBs). Although there have been several techniques to identify linkage sets of loci o form a BB [4, ...
Miwako Tsuji, Masaharu Munetomo, Kiyoshi Akama
CVPR
2008
IEEE
14 years 11 months ago
Loose shape model for discriminative learning of object categories
We consider the problem of visual categorization with minimal supervision during training. We propose a partbased model that loosely captures structural information. We represent ...
Margarita Osadchy, Elran Morash
EMNLP
2007
14 years 11 months ago
Chinese Syntactic Reordering for Statistical Machine Translation
Syntactic reordering approaches are an effective method for handling word-order differences between source and target languages in statistical machine translation (SMT) systems. T...
Chao Wang, Michael Collins, Philipp Koehn