Sciweavers

2208 search results - page 144 / 442
» On Issues of Instance Selection
Sort
View
117
Voted
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 10 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
116
Voted
ECML
2007
Springer
15 years 10 months ago
Optimizing Feature Sets for Structured Data
Choosing a suitable feature representation for structured data is a non-trivial task due to the vast number of potential candidates. Ideally, one would like to pick a small, but in...
Ulrich Rückert, Stefan Kramer
118
Voted
GI
2007
Springer
15 years 10 months ago
Texture-based Surface Segmentation Using Second-order Statistics of Illumination Series
: Many automated visual inspection applications rely on a segmentation of surfaces into meaningful regions, for instance into defective and non-defective areas. This paper presents...
Christoph Lindner, Fabian Schäffler, Fernando...
129
Voted
CBMS
2006
IEEE
15 years 9 months ago
Class Noise and Supervised Learning in Medical Domains: The Effect of Feature Extraction
Inductive learning systems have been successfully applied in a number of medical domains. It is generally accepted that the highest accuracy results that an inductive learning sys...
Mykola Pechenizkiy, Alexey Tsymbal, Seppo Puuronen...
149
Voted
ISCAS
2006
IEEE
119views Hardware» more  ISCAS 2006»
15 years 9 months ago
Scheduling and binding for low gate leakage nanoCMOS datapath circuit synthesis
In this paper we present two polynomial time-complexity heuristic algorithms for optimization of gate-oxide leakage (tunneling current) during behavioral synthesis through simulta...
Saraju P. Mohanty, Elias Kougianos, Ramakrishna Ve...