Sciweavers

8824 search results - page 92 / 1765
» On the Complexity of Real Functions
Sort
View
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
15 years 5 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
ATAL
2005
Springer
15 years 9 months ago
TACOP: a cognitive agent for a naval training simulation environment
This paper describes how cognitive modeling can be exploited in the design of software agents that support naval training sessions. The architecture, specifications, and embedding...
Willem A. van Doesburg, Annerieke Heuvelink, Egon ...
ICANN
2005
Springer
15 years 9 months ago
A Hardware/Software Framework for Real-Time Spiking Systems
Abstract. One focus of recent research in the field of biologically plausible neural networks is the investigation of higher-level functions such as learning, development and modu...
Matthias Oster, Adrian M. Whatley, Shih-Chii Liu, ...
WSCG
2003
145views more  WSCG 2003»
15 years 5 months ago
Real-Time Soft Shadows Using a Single Light Sample
We present a real-time rendering algorithm that generates soft shadows of dynamic scenes using a single light sample. As a depth-map algorithm it can handle arbitrary shadowed sur...
Florian Kirsch, Jürgen Döllner
ESANN
2001
15 years 5 months ago
Optimal transfer function neural networks
Neural networks use neurons of the same type in each layer but such architecture cannot lead to data models of optimal complexity and accuracy. Networks with architectures (number ...
Norbert Jankowski, Wlodzislaw Duch