Sciweavers

1418 search results - page 239 / 284
» Schema polynomials and applications
Sort
View
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 1 months ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
COCO
2004
Springer
104views Algorithms» more  COCO 2004»
14 years 1 months ago
Quantum Arthur-Merlin Games
This paper studies quantum Arthur–Merlin games, which are Arthur–Merlin games in which Arthur and Merlin can perform quantum computations and Merlin can send Arthur quantum in...
Chris Marriott, John Watrous
ECCV
2004
Springer
14 years 1 months ago
Null Space Approach of Fisher Discriminant Analysis for Face Recognition
The null space of the within-class scatter matrix is found to express most discriminative information for the small sample size problem (SSSP). The null space-based LDA takes full ...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan
HYBRID
2004
Springer
14 years 1 months ago
Approximations of the Rate of Growth of Switched Linear Systems
The joint spectral radius of a set of matrices is a measure of the maximal asymptotic growth rate that can be obtained by forming long products of matrices taken from the set. This...
Vincent D. Blondel, Yurii Nesterov, Jacques Theys
HYBRID
2004
Springer
14 years 1 months ago
Inference Methods for Autonomous Stochastic Linear Hybrid Systems
We present a parameter inference algorithm for autonomous stochastic linear hybrid systems, which computes a maximum-likelihood model, given only a set of continuous output data of...
Hamsa Balakrishnan, Inseok Hwang, Jung Soon Jang, ...