Sciweavers

1265 search results - page 117 / 253
» Better Burst Detection
Sort
View
ICPR
2002
IEEE
14 years 3 months ago
Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation
MRI examinations may be used to monitor the progress of neurological disease. Arising structural changes can then be quantified using non-rigid registration procedures. However, ...
Gert Wollny, Marc Tittgemeyer, Frithjof Kruggel
CRYPTO
1997
Springer
108views Cryptology» more  CRYPTO 1997»
14 years 2 months ago
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
: The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protec...
Thomas A. Berson
AUSAI
2008
Springer
14 years 6 days ago
A Refutation Approach to Neighborhood Interchangeability in CSPs
The concept of Interchangeability was developed to deal with redundancy of values in the same domain. Conventional algorithms for detecting Neighborhood Interchangeability work by ...
Chavalit Likitvivatanavong, Roland H. C. Yap
ACL
2007
13 years 11 months ago
Bootstrapping a Stochastic Transducer for Arabic-English Transliteration Extraction
We propose a bootstrapping approach to training a memoriless stochastic transducer for the task of extracting transliterations from an English-Arabic bitext. The transducer learns...
Tarek Sherif, Grzegorz Kondrak
CATS
2008
13 years 11 months ago
On the Efficiency of Pollard's Rho Method for Discrete Logarithms
Pollard's rho method is a randomized algorithm for computing discrete logarithms. It works by defining a pseudo-random sequence and then detecting a match in the sequence. Ma...
Shi Bai, Richard P. Brent