Sciweavers

313 search results - page 34 / 63
» Building Credible Input Models
Sort
View
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
14 years 23 days ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
DAGSTUHL
2006
13 years 9 months ago
Cognitive Vision: Integrating Symbolic Qualitative Representations with Computer Vision
We describe the challenge of combining continuous computer vision techniques and qualitative, symbolic methods to achieve a system capable of cognitive vision. Key to a truly cogni...
Anthony G. Cohn, David C. Hogg, Brandon Bennett, V...
ECSCW
1997
13 years 9 months ago
On Distribution, Drift and the Electronic Medical Record: Some Tools for a Sociology of the Formal
: Formal tools (i.e , tools that operate on circumscribed input using rules, and that contain a model of the workplace in which are to function) are attributed central roles in org...
Marc Berg
GECCO
2010
Springer
225views Optimization» more  GECCO 2010»
13 years 7 months ago
Comparison of NEWUOA with different numbers of interpolation points on the BBOB noiseless testbed
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Raymond Ros
IJON
2006
73views more  IJON 2006»
13 years 7 months ago
Selective attention implemented with dynamic synapses and integrate-and-fire neurons
Selective attention is a process widely used by biological sensory systems to overcome the problem of limited parallel processing capacity: salient subregions of the input stimuli...
Chiara Bartolozzi, Giacomo Indiveri