Sciweavers

181 search results - page 30 / 37
» An analysis of BioHashing and its variants
Sort
View
SAC
2010
ACM
13 years 8 months ago
Reactive parallel processing for synchronous dataflow
The control flow of common processors does not match the specific needs of reactive systems. Key issues for these systems are preemption and concurrency, combined with timing pred...
Claus Traulsen, Reinhard von Hanxleden
SODA
2008
ACM
144views Algorithms» more  SODA 2008»
13 years 8 months ago
Fast dimension reduction using Rademacher series on dual BCH codes
The Fast Johnson-Lindenstrauss Transform (FJLT) was recently discovered by Ailon and Chazelle as a novel technique for performing fast dimension reduction with small distortion fr...
Nir Ailon, Edo Liberty
SODA
2004
ACM
116views Algorithms» more  SODA 2004»
13 years 8 months ago
Retroactive data structures
We introduce a new data structuring paradigm in which operations can be performed on a data structure not only in the present but also in the past. In this new paradigm, called ret...
Erik D. Demaine, John Iacono, Stefan Langerman
MVA
1996
109views Computer Vision» more  MVA 1996»
13 years 8 months ago
Image Features Based on a Mixed Fractal Model and Evaluation of Their Effectiveness in Image Retrieval
Many research works on content-based image retrieval have made use of image features. On the other hand, many kinds of image features have also been developed in the research fiel...
Toshinori Hayashi, Yuzuru Tanaka
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 7 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel