Sciweavers

2254 search results - page 382 / 451
» Computing the minimal covering set
Sort
View
FSE
1998
Springer
131views Cryptology» more  FSE 1998»
14 years 3 months ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows ...
Don Coppersmith, David Wagner, Bruce Schneier, Joh...
KDD
1998
ACM
99views Data Mining» more  KDD 1998»
14 years 3 months ago
On the Efficient Gathering of Sufficient Statistics for Classification from Large SQL Databases
For a wide variety of classification algorithms, scalability to large databases can be achieved by observing that most algorithms are driven by a set of sufficient statistics that...
Goetz Graefe, Usama M. Fayyad, Surajit Chaudhuri
3DPVT
2004
IEEE
101views Visualization» more  3DPVT 2004»
14 years 2 months ago
Pyramid Coordinates for Morphing and Deformation
Many model editing operations, such as morphing, blending, and shape deformation, require the ability to interactively transform the surface of a model in response to some control...
Alla Sheffer, Vladislav Kraevoy
ATS
2004
IEEE
93views Hardware» more  ATS 2004»
14 years 2 months ago
Hybrid BIST Test Scheduling Based on Defect Probabilities
1 This paper describes a heuristic for system-on-chip test scheduling in an abort-on-fail context, where the test is terminated as soon as a defect is detected. We consider an hybr...
Zhiyuan He, Gert Jervan, Zebo Peng, Petru Eles
DIAGRAMS
2006
Springer
14 years 2 months ago
The Mathematics of Boundaries: A Beginning
The intuitive properties of configurations of planar non-overlapping closed curves (boundaries) are presented as a pure boundary mathematics. The mathematics, which is not incorpor...
William Bricken