NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
We describe the challenge of combining continuous computer vision techniques and qualitative, symbolic methods to achieve a system capable of cognitive vision. Key to a truly cogni...
Anthony G. Cohn, David C. Hogg, Brandon Bennett, V...
: Formal tools (i.e , tools that operate on circumscribed input using rules, and that contain a model of the workplace in which are to function) are attributed central roles in org...
In this paper, we study the performances of the NEW Unconstrained Optimization Algorithm (NEWUOA) with different numbers of interpolation points. NEWUOA is a trust region method, ...
Selective attention is a process widely used by biological sensory systems to overcome the problem of limited parallel processing capacity: salient subregions of the input stimuli...