Sciweavers

532 search results - page 38 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
TABLEAUX
2000
Springer
14 years 9 days ago
Benchmark Analysis with FaCT
FaCT (Fast Classification of Terminologies) is a Description Logic (DL) classifier that can also be used for modal logic satisfiability testing. The FaCT system includes two reason...
Ian Horrocks
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 2 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
TIP
2011
217views more  TIP 2011»
13 years 3 months ago
Contextual Object Localization With Multiple Kernel Nearest Neighbor
—Recently, many object localization models have shown that incorporating contextual cues can greatly improve accuracy over using appearance features alone. Therefore, many of the...
Brian McFee, Carolina Galleguillos, Gert R. G. Lan...
EH
2003
IEEE
90views Hardware» more  EH 2003»
14 years 2 months ago
Evolving Sinusoidal Oscillators Using Genetic Algorithms
In the present paper, single-opamp sinusoidal oscillators are synthesized using genetic algorithms. The motivation is to evolve new topologies of oscillators using different activ...
Varun Aggarwal
IJNSEC
2010
324views more  IJNSEC 2010»
13 years 3 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi