Sciweavers

338 search results - page 63 / 68
» Effective Lower Bounding Techniques for Pseudo-Boolean Optim...
Sort
View
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
14 years 4 days ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
PRL
2008
85views more  PRL 2008»
13 years 7 months ago
Reliability estimation of a statistical classifier
Pattern classification techniques derived from statistical principles have been widely studied and have proven powerful in addressing practical classification problems. In real-wo...
Pandu Ranga Rao Devarakota, Bruno Mirbach, Bjö...
DATE
2007
IEEE
150views Hardware» more  DATE 2007»
14 years 2 months ago
Fast memory footprint estimation based on maximal dependency vector calculation
In data dominated applications, loop transformations have a huge impact on the lifetime of array data and therefore on memory footprint. Since a locally optimal loop transformatio...
Qubo Hu, Arnout Vandecappelle, Per Gunnar Kjeldsbe...
ECCV
2008
Springer
14 years 9 months ago
Structuring Visual Words in 3D for Arbitrary-View Object Localization
Abstract. We propose a novel and efficient method for generic arbitraryview object class detection and localization. In contrast to existing singleview and multi-view methods using...
Jianxiong Xiao, Jingni Chen, Dit-Yan Yeung, Long Q...
CADE
2001
Springer
14 years 8 months ago
Context Trees
Context trees are a popular and effective tool for tasks such as compression, sequential prediction, and language modeling. We present an algebraic perspective of context trees for...
Harald Ganzinger, Robert Nieuwenhuis, Pilar Nivela