Sciweavers

4057 search results - page 64 / 812
» Linear combination of transformations
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
Recently proposed algebraic attacks [2, 6] and fast algebraic attacks [1, 5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exp...
Philip Hawkes, Gregory G. Rose
TASLP
2010
97views more  TASLP 2010»
13 years 4 months ago
Voice Conversion Using Partial Least Squares Regression
Abstract--Voice conversion can be formulated as finding a mapping function which transforms the features of the source speaker to those of the target speaker. Gaussian mixture mode...
Elina Helander, Tuomas Virtanen, Jani Nurminen, Mo...
FOSSACS
2012
Springer
12 years 5 months ago
A Coalgebraic Perspective on Minimization and Determinization
Coalgebra offers a unified theory of state based systems, including infinite streams, labelled transition systems and deterministic automata. In this paper, we use the coalgebrai...
Jirí Adámek, Filippo Bonchi, Mathias...
ECCV
2000
Springer
14 years 12 months ago
On Utilising Template and Feature-Based Correspondence in Multi-view Appearance Models
In principle, the recovery and reconstruction of a 3D object from its 2D view projections require the parameterisation of its shape structure and surface re ectance properties. Exp...
Sami Romdhani, Alexandra Psarrou, Shaogang Gong
ICIP
2004
IEEE
14 years 11 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi