Sciweavers

875 search results - page 135 / 175
» Pattern based map comparisons
Sort
View
JOC
2008
92views more  JOC 2008»
13 years 8 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
PR
2006
119views more  PR 2006»
13 years 8 months ago
Performance evaluation and optimization for content-based image retrieval
Performance evaluation of content-based image retrieval (CBIR) systems is an important but still unsolved problem. The reason for its importance is that only performance evaluatio...
Julia Vogel, Bernt Schiele
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 8 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
GIS
2010
ACM
13 years 7 months ago
Querying the future of spatio-temporal objects
Since navigation systems and tracking devices are becoming ubiquitous in our daily life, the development of efficient methods for processing massive sets of mobile objects are of ...
Philip Schmiegelt, Bernhard Seeger
GRAPHICSINTERFACE
2000
13 years 10 months ago
Analysis and Synthesis of Structural Textures
With the advent of image based modeling techniques, it becomes easier to apply textures extracted from reality onto virtual worlds. Many repetitive patterns (structural textures) ...
Laurent Lefebvre, Pierre Poulin