Sciweavers

10602 search results - page 46 / 2121
» Weakly Useful Sequences
Sort
View
SIAMADS
2010
92views more  SIAMADS 2010»
13 years 3 months ago
Weak Stability Boundary and Invariant Manifolds
The concept of weak stability boundary has been successfully used in the design of several fuel efficient space missions. In this paper we give a rigorous definition of the weak st...
Edward Belbruno, Marian Gidea, Francesco Topputo
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 9 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CISIS
2009
IEEE
14 years 4 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...
ICPR
2004
IEEE
14 years 10 months ago
Boosting Nested Cascade Detector for Multi-View Face Detection
In this paper, a novel nested cascade detector for multi-view face detection is presented. This nested cascade is learned by Schapire and Singer's improved boosting algorithm...
Bo Wu, Chang Huang, Haizhou Ai, Shihong Lao
GLOBECOM
2006
IEEE
14 years 3 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia