Sciweavers

18209 search results - page 119 / 3642
» Some Remarks on the Paper
Sort
View
GECCO
2010
Springer
180views Optimization» more  GECCO 2010»
14 years 2 months ago
Comparing results of 31 algorithms from the black-box optimization benchmarking BBOB-2009
This paper presents results of the BBOB-2009 benchmarking of 31 search algorithms on 24 noiseless functions in a black-box optimization scenario in continuous domain. The runtime ...
Nikolaus Hansen, Anne Auger, Raymond Ros, Steffen ...
CDC
2009
IEEE
107views Control Systems» more  CDC 2009»
14 years 2 months ago
Learning approaches to the Witsenhausen counterexample from a view of potential games
— Since Witsenhausen put forward his remarkable counterexample in 1968, there have been many attempts to develop efficient methods for solving this non-convex functional optimiz...
Na Li, Jason R. Marden, Jeff S. Shamma
ICB
2009
Springer
170views Biometrics» more  ICB 2009»
14 years 2 months ago
Face Gender Classification on Consumer Images in a Multiethnic Environment
Abstract. In this paper, we target at face gender classification on consumer images in a multiethnic environment. The consumer images are much more challenging, since the faces cap...
Wei Gao, Haizhou Ai
ASIACRYPT
2001
Springer
14 years 2 months ago
How to Achieve a McEliece-Based Digital Signature Scheme
Abstract. McEliece is one of the oldest known public key cryptosystems. Though it was less widely studied than RSA, it is remarkable that all known attacks are still exponential. I...
Nicolas Courtois, Matthieu Finiasz, Nicolas Sendri...
IWANN
2001
Springer
14 years 2 months ago
The General Neural-Network Paradigm for Visual Cryptography
This paper proposes the general paradigm to build Q'tron neural networks (NNs) for visual cryptography. Given a visual encryption scheme, usually described using an access st...
Tai-Wen Yue, Suchen Chiang