Sciweavers

450 search results - page 7 / 90
» Algorithmic uses of the Feferman-Vaught Theorem
Sort
View
CCS
2004
ACM
14 years 26 days ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
GECCO
2006
Springer
130views Optimization» more  GECCO 2006»
13 years 11 months ago
Ensemble selection for evolutionary learning using information theory and price's theorem
This paper presents an information theoretic perspective on design and analysis of evolutionary algorithms. Indicators of solution quality are developed and applied not only to in...
Stuart W. Card, Chilukuri K. Mohan
ICIP
1997
IEEE
14 years 9 months ago
Using the Fourier Slice Theorem for Representation of Object Views and Models with application to Face Recognition
A novel method unifying viewer and model centered approaches for representing structurally complex 3-D objects like human faces is presented. The uni ed 3D frequency-domain repres...
Dibyendu Nandy, Jezekiel Ben-Arie
ECP
1997
Springer
102views Robotics» more  ECP 1997»
13 years 11 months ago
Event Calculus Planning Revisited
In 1969 Cordell Green presented his seminal description of planning as theorem proving with the situation calculus. The most pleasing feature of Green's account was the negli...
Murray Shanahan
ACCV
2006
Springer
14 years 1 months ago
Interpreting Sphere Images Using the Double-Contact Theorem
An occluding contour of a sphere is projected to a conic in the perspective image, and such a conic is called a sphere image. Recently, it has been discovered that each sphere imag...
Xianghua Ying, Hongbin Zha