Sciweavers

1287 search results - page 99 / 258
» Self-Normalized Linear Tests
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
13 years 9 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
IMAGING
2001
13 years 9 months ago
Spherical Sampling and Color Transformations
In this paper, we present a spherical sampling technique that can be employed to find optimal sensors for trichromatic color applications. The advantage over other optimization te...
Graham D. Finlayson, Sabine Süsstrunk
ESANN
2003
13 years 9 months ago
RetinotopicNET: An Efficient Simulator for Retinotopic Visual Architectures
: -RetinotopicNET is an efficient simulator for neural networks with retinotopic-like receptive fields. The system has two main characteristics: it is event-driven and it takes adv...
Raul Cristian Muresan
NAACL
2004
13 years 9 months ago
Improvements in Phrase-Based Statistical Machine Translation
In statistical machine translation, the currently best performing systems are based in some way on phrases or word groups. We describe the baseline phrase-based translation system...
Richard Zens, Hermann Ney
NAACL
2003
13 years 9 months ago
Semantic Language Models for Topic Detection and Tracking
In this work, we present a new semantic language modeling approach to model news stories in the Topic Detection and Tracking (TDT) task. In the new approach, we build a unigram la...
Ramesh Nallapati