Sciweavers

4816 search results - page 915 / 964
» Performance analysis of the AntNet algorithm
Sort
View
168
Voted
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
15 years 3 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
APVIS
2009
15 years 3 months ago
Correlation study of time-varying multivariate climate data sets
We present a correlation study of time-varying multivariate volumetric data sets. In most scientific disciplines, to test hypotheses and discover insights, scientists are interest...
Jeffrey Sukharev, Chaoli Wang, Kwan-Liu Ma, Andrew...
139
Voted
BIOCOMP
2008
15 years 3 months ago
Improved Segmentation Based on Probabilistic Labeling
⎯This paper presents an improved multi-object segmentation algorithm based on probabilistic labeling. First, a critical look is focused on utilizing vector calculus operator and ...
Kai-Chieh Yang, Ming-Chi Jhuang, Chun-Shun Tseng, ...
124
Voted
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 3 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
144
Voted
CLEF
2009
Springer
15 years 3 months ago
Interactive Probabilistic Search for GikiCLEF
In this paper we will briefly describe the approaches taken by the Berkeley Cheshire Group for the GikiCLEF task of the QA track. Because the task was intended to model some aspec...
Ray R. Larson