Sciweavers

315 search results - page 7 / 63
» Claims Analysis
Sort
View
WISA
2007
Springer
14 years 2 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
ICPR
2000
IEEE
14 years 28 days ago
Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods
Generation of ground-truths is of great importance for unbiased performance evaluation of document layout analysis methods. This is especially necessary because many methods are c...
Oleg Okun, Matti Pietikäinen
JIFS
2002
60views more  JIFS 2002»
13 years 8 months ago
Turing's analysis of computation and artificial neural networks
A novel way to simulate Turing Machines (TMs) by Artificial Neural Networks (ANNs) is proposed. We claim that the proposed simulation is in agreement with the correct interpretatio...
Wilson Rosa de Oliveira, Marcílio Carlos Pe...
SIAMSC
2010
137views more  SIAMSC 2010»
13 years 3 months ago
Accuracy Measures and Fourier Analysis for the Full Multigrid Algorithm
Abstract. The full multigrid (FMG) algorithm is often claimed to achieve so-called discretizationlevel accuracy. In this paper, this notion is formalized by defining a worst-case r...
Carmen Rodrigo, Francisco J. Gaspar, Cornelis W. O...
IWINAC
2009
Springer
14 years 3 months ago
Brain Complexity: Analysis, Models and Limits of Understanding
Manifold initiatives try to utilize the operational principles of organisms and brains to develop alternative, biologically inspired computing paradigms. This paper reviews key fea...
Andreas Schierwagen