Sciweavers

1287 search results - page 99 / 258
» Self-Normalized Linear Tests
Sort
View
115
Voted
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 4 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
98
Voted
IMAGING
2001
15 years 4 months ago
Spherical Sampling and Color Transformations
In this paper, we present a spherical sampling technique that can be employed to find optimal sensors for trichromatic color applications. The advantage over other optimization te...
Graham D. Finlayson, Sabine Süsstrunk
117
Voted
ESANN
2003
15 years 4 months ago
RetinotopicNET: An Efficient Simulator for Retinotopic Visual Architectures
: -RetinotopicNET is an efficient simulator for neural networks with retinotopic-like receptive fields. The system has two main characteristics: it is event-driven and it takes adv...
Raul Cristian Muresan
117
Voted
NAACL
2004
15 years 4 months ago
Improvements in Phrase-Based Statistical Machine Translation
In statistical machine translation, the currently best performing systems are based in some way on phrases or word groups. We describe the baseline phrase-based translation system...
Richard Zens, Hermann Ney
121
Voted
NAACL
2003
15 years 4 months ago
Semantic Language Models for Topic Detection and Tracking
In this work, we present a new semantic language modeling approach to model news stories in the Topic Detection and Tracking (TDT) task. In the new approach, we build a unigram la...
Ramesh Nallapati