Sciweavers

471 search results - page 81 / 95
» Computational complexity: a conceptual perspective
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
ICCV
2003
IEEE
14 years 26 days ago
What Does Motion Reveal About Transparency?
The perception of transparent objects from images is known to be a very hard problem in vision. Given a single image, it is difficult to even detect the presence of transparent o...
Moshe Ben-Ezra, Shree K. Nayar
ICSOC
2010
Springer
13 years 6 months ago
A Programmble Fault Injection Testbed Generator for SOA
In this demo paper we present the prototype of our fault injection testbed generator. Our tool empowers engineers to generate emulated SOA environments and to program fault injecti...
Lukasz Juszczyk, Schahram Dustdar
FGR
2011
IEEE
244views Biometrics» more  FGR 2011»
12 years 11 months ago
Emotion representation, analysis and synthesis in continuous space: A survey
— Despite major advances within the affective computing research field, modelling, analysing, interpreting and responding to naturalistic human affective behaviour still remains...
Hatice Gunes, Björn Schuller, Maja Pantic, Ro...
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
14 years 6 days ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux