Sciweavers

10602 search results - page 12 / 2121
» Weakly Useful Sequences
Sort
View
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
14 years 1 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
PLDI
2010
ACM
14 years 28 days ago
Mint: Java multi-stage programming using weak separability
Multi-stage programming (MSP) provides a disciplined approach to run-time code generation. In the purely functional setting, it has been shown how MSP can be used to reduce the ov...
Edwin Westbrook, Mathias Ricken, Jun Inoue, Yilong...
ICPR
2008
IEEE
14 years 9 months ago
Weakly supervised learning using proportion-based information: An application to fisheries acoustics
This paper addresses the inference of probabilistic classification models using weakly supervised learning. In contrast to previous work, the use of proportion-based training data...
Carla Scalarin, Jacques Masse, Jean-Marc Boucher, ...
AROBOTS
2005
98views more  AROBOTS 2005»
13 years 7 months ago
Terrain Classification Using Weakly-Structured Vehicle/Terrain Interaction
We present a new terrain classification technique both for effective, autonomous locomotion over rough, unknown terrains and for the qualitative analysis of terrains for exploratio...
Amy C. Larson, Guleser K. Demir, Richard M. Voyles
ICASSP
2010
IEEE
13 years 8 months ago
Graph based event detection from realistic videos using weak feature correspondence
We study the problem of event detection from realistic videos with repetitive sequential human activities. Despite the large body of work on event detection and recognition, very ...
Lei Ding, Quanfu Fan, Jen-Hao Hsiao, Sharath Panka...