Sciweavers

8582 search results - page 60 / 1717
» Here or There
Sort
View
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 10 months ago
Small Size Hashes with Enhanced Security
This paper contains techniques for enhancing the strength of any cryptographic hash function. For an "ideal", traditional hash function with an m-bit result, the complex...
Lars R. Knudsen
CORR
2007
Springer
79views Education» more  CORR 2007»
13 years 10 months ago
Ontology and Formal Semantics - Integration Overdue
but other abstract objects as well (e.g., states, processes, properties, activities, attributes, etc.) It will be demonstrated here that in such a framework, a number of challenges...
Walid S. Saba
JMLR
2008
104views more  JMLR 2008»
13 years 10 months ago
Nearly Uniform Validation Improves Compression-Based Error Bounds
This paper develops bounds on out-of-sample error rates for support vector machines (SVMs). The bounds are based on the numbers of support vectors in the SVMs rather than on VC di...
Eric Bax
JCT
2006
55views more  JCT 2006»
13 years 10 months ago
A proof of the q, t-square conjecture
We prove a combinatorial formula conjectured by Loehr and Warrington for the coefficient of the sign character in (pn). Here denotes the Bergeron-Garsia nabla operator, and pn is a...
Mahir Can, Nicholas A. Loehr
KES
2008
Springer
13 years 10 months ago
Developmental evaluation in Genetic Programming: The TAG-based frame work
We build on our previous feasibility studies [18,20], which demonstrated the impact of evaluation during development in the DEVTAG system, and here present a fullfledged developmen...
Tuan Hao Hoang, Daryl Essam, Robert I. McKay, Nguy...