Sciweavers

1969 search results - page 258 / 394
» Financial Theory 1
Sort
View
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
14 years 3 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
GECCO
2005
Springer
122views Optimization» more  GECCO 2005»
14 years 3 months ago
An enhanced GA to improve the search process reliability in tuning of control systems
Evolutionary Algorithms (EAs) have been largely applied to optimisation and synthesis of controllers. In spite of several successful applications and competitive solutions, the st...
Andrea Soltoggio
ITRUST
2005
Springer
14 years 3 months ago
A Probabilistic Trust Model for Handling Inaccurate Reputation Sources
Abstract. This research aims to develop a model of trust and reputation that will ensure good interactions amongst software agents in large scale open systems in particular. The fo...
Jigar Patel, W. T. Luke Teacy, Nicholas R. Jenning...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 3 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
SCALESPACE
2005
Springer
14 years 3 months ago
Regularity and Scale-Space Properties of Fractional High Order Linear Filtering
We investigate the use of fractional powers of the Laplacian for signal and image simplification. We focus both on their corresponding variational techniques and parabolic pseudod...
Stephan Didas, Bernhard Burgeth, Atsushi Imiya, Jo...