Sciweavers

672 search results - page 105 / 135
» An assessment of tag presentation techniques
Sort
View
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
ICDAR
2009
IEEE
14 years 2 months ago
The GERMANA Database
A new handwritten text database, GERMANA, is presented to facilitate empirical comparison of different approaches to text line extraction and off-line handwriting recognition. G...
Daniel Pérez, Lionel Tarazón, Nicol&...
ISDA
2009
IEEE
14 years 2 months ago
Similarity Analysis of Protein Binding Sites: A Generalization of the Maximum Common Subgraph Measure Based on Quasi-Clique Dete
—Protein binding sites are often represented by means of graphs capturing their most important geometrical and physicochemical properties. Searching for structural similarities a...
Imen Boukhris, Zied Elouedi, Thomas Fober, Marco M...
CEC
2008
IEEE
14 years 2 months ago
A parallel surrogate-assisted multi-objective evolutionary algorithm for computationally expensive optimization problems
Abstract— This paper presents a new efficient multiobjective evolutionary algorithm for solving computationallyintensive optimization problems. To support a high degree of parall...
Anna Syberfeldt, Henrik Grimm, Amos Ng, Robert Ivo...
ICPR
2008
IEEE
14 years 2 months ago
Vector valued regression for iron overload estimation
In this work we present and discuss in detail a novel vector-valued regression technique: our approach allows for an all-at-once estimation, as opposed to solve a number of scalar...
Luca Baldassarre, Annalisa Barla, Barbara Gianesin...