Sciweavers

1960 search results - page 131 / 392
» The Logic of Large Enough
Sort
View
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 1 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
AMDO
2006
Springer
14 years 28 days ago
Matching Deformable Features Based on Oriented Multi-scale Filter Banks
This paper presents a technique to enable deformable objects to be matched throughout video sequences based on the information provided by multi-scale Gaussian derivative filter ba...
Manuel J. Marín-Jiménez, Nicolas P&e...
CMSB
2004
Springer
14 years 27 days ago
Residual Bootstrapping and Median Filtering for Robust Estimation of Gene Networks from Microarray Data
We propose a robust estimation method of gene networks based on microarray gene expression data. It is well-known that microarray data contain a large amount of noise and some outl...
Seiya Imoto, Tomoyuki Higuchi, SunYong Kim, Euna J...
ECAI
2006
Springer
14 years 25 days ago
Multi-Objective Propagation in Constraint Programming
Bounding constraints are used to bound the tolerance of solutions under certain undesirable features. Standard solvers propagate them one by one. Often times, it is easy to satisfy...
Emma Rollon, Javier Larrosa
ESOP
2000
Springer
14 years 23 days ago
Formalizing Implementation Strategies for First-Class Continuations
Abstract. We present the first formalization of implementation straor first-class continuations. The formalization hinges on abstract machines for continuation-passing style (CPS) ...
Olivier Danvy