Sciweavers

459 search results - page 53 / 92
» A heuristic approach for multiple restricted multiplication
Sort
View
FSE
2006
Springer
116views Cryptology» more  FSE 2006»
13 years 11 months ago
On Feistel Structures Using a Diffusion Switching Mechanism
We study a recently proposed design approach of Feistel structure which employs diffusion matrices in a switching way. At ASIACRYPT 2004, Shirai and Preneel have proved that large ...
Taizo Shirai, Kyoji Shibutani
CVPR
2005
IEEE
14 years 9 months ago
Hybrid Models for Human Motion Recognition
Probabilistic models have been previously shown to be efficient and effective for modeling and recognition of human motion. In particular we focus on methods which represent the h...
Claudio Fanti, Lihi Zelnik-Manor, Pietro Perona
COR
2010
123views more  COR 2010»
13 years 7 months ago
Decomposition, reformulation, and diving in university course timetabling
In many real-life optimisation problems, there are multiple interacting components in a solution. For example, different components might specify assignments to different kinds of...
Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, ...
BMCBI
2011
13 years 2 months ago
Shape-based peak identification for ChIP-Seq
Background: The identification of binding targets for proteins using ChIP-Seq has gained popularity as an alternative to ChIP-chip. Sequencing can, in principle, eliminate artifac...
Valerie Hower, Steven N. Evans, Lior Pachter
MOBIHOC
2008
ACM
14 years 7 months ago
Strong barrier coverage of wireless sensor networks
Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to ...
Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipu...