Sciweavers

331 search results - page 22 / 67
» New Results on the Pseudorandomness of Some Blockcipher Cons...
Sort
View
SISAP
2008
IEEE
98views Data Mining» more  SISAP 2008»
14 years 3 months ago
On Reinsertions in M-tree
In this paper we introduce a new M-tree building method, utilizing the classic idea of forced reinsertions. In case a leaf is about to split, some distant objects are removed from...
Jakub Lokoc, Tomás Skopal
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 6 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
WSC
2004
13 years 10 months ago
Permuted Weighted Area Estimators
Calvin and Nakayama previously introduced permuting as a way of improving existing standardized time series methods. The basic idea is to split a simulated sample path into nonove...
James M. Calvin, Marvin K. Nakayama
ACCV
1998
Springer
14 years 1 months ago
Shape Modeling from Multiple View Images Using GAs
Shape modeling is a very important issue for many study, for example, object recognition for robot vision, virtual environment construction, and so on. In this paper, a new method...
Satoshi Kirihara, Hideo Saito
HICSS
2003
IEEE
80views Biometrics» more  HICSS 2003»
14 years 2 months ago
Does Bundling Add-Ins Help Consumers?
Abstract— Third party developed software add-ins enhance the functionality of a large variety of base software such as operating systems, word processors, spread sheets, graphics...
Rajiv M. Dewan, Marshall L. Freimer