Sciweavers

1898 search results - page 15 / 380
» Weak Keys for IDEA
Sort
View
INDOCRYPT
2005
Springer
14 years 2 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
ENTCS
2008
89views more  ENTCS 2008»
13 years 8 months ago
On the Relationship between Filter Spaces and Weak Limit Spaces
: Countably based filter spaces have been suggested in the 1970's as a model for recursion theory on higher types. Weak limit spaces with a countable base are known to be the ...
Matthias Schröder
ICCV
2011
IEEE
12 years 8 months ago
iGroup : Weakly supervised image and video grouping
We present a generic, efficient and iterative algorithm for interactively clustering classes of images and videos. The approach moves away from the use of large hand labelled tra...
Andrew Gilbert, Richard Bowden
CISM
1993
149views GIS» more  CISM 1993»
14 years 21 days ago
The Weak Instance Model
The weak instance model is a framework to consider the relations in a database as a whole, regardless of the way attributes are grouped in the individual relations. Queries and upd...
Paolo Atzeni, Riccardo Torlone
JOTA
2010
104views more  JOTA 2010»
13 years 3 months ago
Structure and Weak Sharp Minimum of the Pareto Solution Set for Piecewise Linear Multiobjective Optimization
Abstract. In this paper the Pareto solution set of a piecewise linear multiobjective optimization problem in a normed space is shown to be a union of finitely many semiclosed polyh...
X. Q. Yang, N. D. Yen