Sciweavers

61 search results - page 8 / 13
» Performance analysis of niching algorithms based on derandom...
Sort
View
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
ICMCS
2007
IEEE
152views Multimedia» more  ICMCS 2007»
14 years 2 months ago
An Efficient Linguistic Steganography for Chinese Text
Linguistic steganography, as a method of text steganography, is becoming a hot spot. To investigate the linguistic steganography for Chinese text, A Chinese linguistic steganograp...
Liu Yuling, Sun Xingming, Gan Can, Wang Hong
BMCBI
2010
176views more  BMCBI 2010»
13 years 5 months ago
Haplotype association analyses in resources of mixed structure using Monte Carlo testing
Background: Genomewide association studies have resulted in a great many genomic regions that are likely to harbor disease genes. Thorough interrogation of these specific regions ...
Ryan Abo, Jathine Wong, Alun Thomas, Nicola J. Cam...
TASE
2008
IEEE
13 years 7 months ago
Optimization of Joint Replacement Policies for Multipart Systems by a Rollout Framework
Maintaining an asset with life-limited parts, e.g., a jet engine or an electric generator, may be costly. Certain costs, e.g., setup cost, can be shared if some parts of the asset ...
Tao Sun, Qianchuan Zhao, Peter B. Luh, Robert N. T...
DELTA
2008
IEEE
14 years 2 months ago
Eigenspectra Palmprint Recognition
This paper introduces a novel technique for palmprint recognition on the transform domain, based on combining principle component analysis (PCA) and Fourier domain. Principal Comp...
Moussadek Laadjel, Ahmed Bouridane, Fatih Kurugoll...