Sciweavers

147 search results - page 7 / 30
» enter 2008
Sort
View
CHINAF
2008
105views more  CHINAF 2008»
13 years 9 months ago
Fast correlation attack on stream cipher ABC v3
ABC v3 is a stream cipher proposed as a candidate to ECRYPT Estream Project which enters the second evaluation phase. Its key length is 128 bits. In this paper, We show that, ther...
Haina Zhang, Lin Li, Xiaoyun Wang
CLEIEJ
2008
96views more  CLEIEJ 2008»
13 years 9 months ago
Differences in Perception of Computer Sciences and Informatics due to Gender and Experience
Low participation of women in Computer Science (CS) has been documented in some countries. Since this phenomenon occurs in the Computer Science and Informatics Department at the U...
Gabriela Marín, Elena Gabriela Barrantes, S...
COR
2008
96views more  COR 2008»
13 years 9 months ago
Discrete models for competitive location with foresight
We adapt the competitive location model based on maximal covering to include the knowledge that a competitor will enter the market later with a single new facility. The objective ...
Frank Plastria, Lieselot Vanhaverbeke
ESWA
2008
134views more  ESWA 2008»
13 years 9 months ago
Automatic feature-queried bird identification system based on entropy and fuzzy similarity
Birdwatching is one of the very interesting hobbies and most important work. Many birdwatching assistant systems have been developed. However, most of them do not have any intelli...
Xingqi Wang, Thorsten Schnier, Xin Yao
CVIU
2006
76views more  CVIU 2006»
13 years 9 months ago
Homeostatic image perception: An artificial system
This paper describes how a visual system can automatically define features of interest from the observation of a large enough number of natural images. The principle complements t...
Thomas Feldman, Laurent Younes