Sciweavers

318 search results - page 23 / 64
» Preimage Relations and Their Matrices
Sort
View
CIARP
2006
Springer
14 years 12 days ago
A Theoretical Comparison of Two Linear Dimensionality Reduction Techniques
Abstract. A theoretical analysis for comparing two linear dimensionality reduction (LDR) techniques, namely Fisher's discriminant (FD) and Loog-Duin (LD) dimensionality reduci...
Luis Rueda, Myriam Herrera
AUTOMATICA
2006
70views more  AUTOMATICA 2006»
13 years 8 months ago
A Toeplitz algorithm for polynomial J-spectral factorization
A block Toeplitz algorithm is proposed to perform the J-spectral factorization of a para-Hermitian polynomial matrix. The input matrix can be singular or indefinite, and it can ha...
Juan Carlos Zúñiga, Didier Henrion
ENGL
2007
109views more  ENGL 2007»
13 years 8 months ago
Using Neural Network for DJIA Stock Selection
—This paper presents methodologies to select equities based on soft-computing models which focus on applying fundamental analysis for equities screening. This paper compares the ...
Tong-Seng Quah
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
14 years 2 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold
ACNS
2006
Springer
117views Cryptology» more  ACNS 2006»
14 years 2 months ago
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
We study the influence of collision-finding attacks on the security of time-stamping schemes. We distinguish between client-side hash functions used to shorten the documents befo...
Ahto Buldas, Sven Laur