Results 1 - 10
of
17,676
Date ABSTRACT
, 2008
"... SIGABA is a rotor-based cipher machine that is famous for its service during World War II by the United States. Compared to other ciphers used in World War II, such as the German Enigma or the Japanese Purple, SIGABA’s security was undefeatable, as it was the only cipher to withstand all cryptanalyt ..."
Abstract
- Add to MetaCart
SIGABA is a rotor-based cipher machine that is famous for its service during World War II by the United States. Compared to other ciphers used in World War II, such as the German Enigma or the Japanese Purple, SIGABA’s security was undefeatable, as it was the only cipher to withstand all cryptanalytic attacks in the course of its usage. This thesis covers the history of SIGABA’s development, how SIGABA works, and a cryptanalytic attack on SIGABA. The attack covered in this thesis has never been implemented before and is divided into a primary phase and secondary phase. The attack recovers SIGABA’s keyspace by targeting SIGABA’s rotor banks separately, while demonstrating SIGABA’s strength in design that separates it from other ciphers. ACKNOWLEDGEMENTS To my parents who taught me the value of an education and raised me to be the person I am today.
The FERET evaluation methodology for face recognition algorithms
- In (a) Example 1 (b) Example 1 (c) Right ear) (d) Mirroed Left ear
"... AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial i ..."
Abstract
-
Cited by 1116 (26 self)
- Add to MetaCart
AbstractÐTwo of the most critical requirements in support of producing reliable face-recognition systems are a large database of facial images and a testing procedure to evaluate systems. The Face Recognition Technology (FERET) program has addressed both issues through the FERET database of facial
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, in Ad Hoc Networking, edited by Charles E.
- Perkins, Chapter
, 2001
"... Abstract The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network ..."
Abstract
-
Cited by 764 (8 self)
- Add to MetaCart
Abstract The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network
The anatomy of a large-scale hypertextual web search engine.
- Comput. Netw. ISDN Syst.,
, 1998
"... Abstract In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext. Google is designed to crawl and index the Web efficiently and produce much more satisfying search results than existing systems. The prototype with a fu ..."
Abstract
-
Cited by 4673 (5 self)
- Add to MetaCart
Abstract In this paper, we present Google, a prototype of a large-scale search engine which makes heavy use of the structure present in hypertext. Google is designed to crawl and index the Web efficiently and produce much more satisfying search results than existing systems. The prototype with a
Biclustering algorithms for biological data analysis: a survey.
- IEEE/ACM Transactions of Computational Biology and Bioinformatics,
, 2004
"... Abstract A large number of clustering approaches have been proposed for the analysis of gene expression data obtained from microarray experiments. However, the results of the application of standard clustering methods to genes are limited. These limited results are imposed by the existence of a num ..."
Abstract
-
Cited by 481 (15 self)
- Add to MetaCart
Abstract A large number of clustering approaches have been proposed for the analysis of gene expression data obtained from microarray experiments. However, the results of the application of standard clustering methods to genes are limited. These limited results are imposed by the existence of a
Date Abstract Interactive Simulation of Fluid Flow
, 2011
"... with the regulations of this University and meets the accepted standards with re- ..."
Abstract
- Add to MetaCart
with the regulations of this University and meets the accepted standards with re-
The Jump-Risk Premia Implicit in Options: Evidence from an Integrated Time-Series Study
- Journal of Financial Economics
"... Abstract: This paper examines the joint time series of the S&P 500 index and near-the-money short-dated option prices with an arbitrage-free model, capturing both stochastic volatility and jumps. Jump-risk premia uncovered from the joint data respond quickly to market volatility, becoming more p ..."
Abstract
-
Cited by 419 (3 self)
- Add to MetaCart
Abstract: This paper examines the joint time series of the S&P 500 index and near-the-money short-dated option prices with an arbitrage-free model, capturing both stochastic volatility and jumps. Jump-risk premia uncovered from the joint data respond quickly to market volatility, becoming more
An Introduction to Machine Translation
, 1992
"... Abstract. In the last ten years there has been a significant amount of research in Machine Translation within a “new ” paradigm of empirical approaches, often labelled collectively as “Example-based” approaches. The first manifestation of this approach caused some surprise and hostility among observ ..."
Abstract
-
Cited by 412 (9 self)
- Add to MetaCart
Abstract. In the last ten years there has been a significant amount of research in Machine Translation within a “new ” paradigm of empirical approaches, often labelled collectively as “Example-based” approaches. The first manifestation of this approach caused some surprise and hostility among
Revised calibration of the geomagnetic polarity timescale for the late Cretaceous and Cenozoic
- Journal of Geophysical Research
, 1995
"... Abstract. Recently reported radioisotopic dates and magnetic anomaly spacings have made it evident hat modification is required for the age calibrations for the geomagnetic polarity timescale of Cande and Kent (1992) at the Cretaceous/Paleogene boundary and in the Pliocene. An adjusted geomagnetic r ..."
Abstract
-
Cited by 401 (7 self)
- Add to MetaCart
Abstract. Recently reported radioisotopic dates and magnetic anomaly spacings have made it evident hat modification is required for the age calibrations for the geomagnetic polarity timescale of Cande and Kent (1992) at the Cretaceous/Paleogene boundary and in the Pliocene. An adjusted geomagnetic
Results 1 - 10
of
17,676