Sciweavers

4498 search results - page 9 / 900
» How to Invent Functions
Sort
View
114
Voted
JOCN
2010
131views more  JOCN 2010»
15 years 3 months ago
How Do We Empathize with Someone Who Is Not Like Us? A Functional Magnetic Resonance Imaging Study
Claus Lamm, Andrew N. Meltzoff, Jean Decety
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 9 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
HPCN
1998
Springer
15 years 8 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears