Sciweavers

288 search results - page 34 / 58
» random 1998
Sort
View
101
Voted
ISCI
1998
91views more  ISCI 1998»
15 years 3 days ago
The Improper Fuzzy Riemann Integral and its Numerical Integration
The improper fuzzy Riemann integral and its numerical integration are proposed in this paper. Under the setting of the improper fuzzy Riemann integral, we can ®nd the expectation...
Hsien-Chung Wu
104
Voted
MP
1998
109views more  MP 1998»
15 years 3 days ago
Rounding algorithms for covering problems
In the last 25 years approximation algorithms for discrete optimization problems have been in the center of research in the fields of mathematical programming and computer science...
Dimitris Bertsimas, Rakesh V. Vohra
78
Voted
ICIP
1998
IEEE
16 years 2 months ago
Segmentation of Dermatoscopic Images by Stabilized Inverse Diffusion Equations
Several segmentation techniques were evaluated for their effectiveness in distinguishing lesion from background in dermatoscopic images of pigmented lesions (moles and melanomas)....
Jianbo Gao, Jun Zhang, Matthew G. Fleming, Ilya Po...
92
Voted
PKC
2007
Springer
147views Cryptology» more  PKC 2007»
15 years 6 months ago
New Chosen-Ciphertext Attacks on NTRU
We present new and efficient key-recovery chosen-ciphertext attacks on NTRUencrypt. Our attacks are somewhat intermediate between chosen-ciphertext attacks on NTRUencrypt previousl...
Nicolas Gama, Phong Q. Nguyen
108
Voted
ICNP
1998
IEEE
15 years 4 months ago
Evaluating the Overheads of Source-Directed Quality-of-Service Routing
Quality-of-service (QoS) routing satisfiesapplication performance requirements and optimizes network resource usage but effective path-selection schemes require the distribution o...
Anees Shaikh, Jennifer Rexford, Kang G. Shin