Sciweavers

12438 search results - page 42 / 2488
» The Magic of a Number System
Sort
View
ICDAR
2003
IEEE
14 years 1 months ago
Optimizing the Number of States, Training Iterations and Gaussians in an HMM-based Handwritten Word Recognizer
In off-line handwriting recognition, classifiers based on hidden Markov models (HMMs) have become very popular. However, while there exist well-established training algorithms, s...
Simon Günter, Horst Bunke
ISSTA
1989
ACM
14 years 1 days ago
Estimating the Number of Test Cases Required to Satisfy the All-du-paths Testing Criterion
The all-du-paths software testing criterion is the most discriminating of the data ow testing criteria of Rapps and Weyuker. Unfortunately, in the worst case, the criterion requir...
James M. Bieman, J. Schultz
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 8 months ago
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators
We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to freq...
A. Theodore Markettos, Simon W. Moore
ICIP
2005
IEEE
14 years 1 months ago
Scalable multiple description video coding with flexible number of descriptions
Multiple description video coding mitigates the effects of packet losses introduced by congestion and/or bit errors. In this paper, we propose a novel multiple description video c...
Emrah Akyol, A. Murat Tekalp, Mehmet R. Civanlar
RTA
2009
Springer
14 years 2 months ago
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
Abstract. We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the securit...
Sergiu Bursuc, Hubert Comon-Lundh