• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 475
Next 10 →

A Re-Examination of Brute-Force Search

by Jonathan Schaeffer , Paul Lu, Duane Szafron, Robert Lake , 1993
"... In August 1992, the World Checkers Champion, Dr. Marion Tinsley, defended his title against the computer program Chinook. The best-of-40-game match was won by Tinsley with 4 wins to the program's 2. This was the first time in history that a program played for a human World Championship. Chinook ..."
Abstract - Cited by 10 (4 self) - Add to MetaCart
. Chinook, with its deep search and endgame databases, has established itself as a Grandmaster checker player. However, the match demonstrated that current brute-force game-playing techniques alone will be insufficient to defeat human champions in games as complex as checkers. This paper re-examines brute-force

In Brute-Force Search of Correlation Bounds for Polynomials

by Frederic Green, Daniel Kreymer, Emanuele Viola , 2011
"... We report on some initial results of a brute-force search for determining the maximum correlation between degree-d polynomials modulo p and the n-bit mod q function. For various settings of the parameters n, d, p, and q, our results indicate that symmetric polynomials yield the maximum correlation. ..."
Abstract - Add to MetaCart
We report on some initial results of a brute-force search for determining the maximum correlation between degree-d polynomials modulo p and the n-bit mod q function. For various settings of the parameters n, d, p, and q, our results indicate that symmetric polynomials yield the maximum correlation

Power of Brute-force Search in Strongly-typed Inductive Functional Programming Automation

by Susumu Katayama
"... Abstract. A successful case of applying brute-force search to functional programming automation is presented and compared with a conventional genetic programming method. From the information of the type and the property that should be satisfied, this algorithm is able to find automatically the short ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. A successful case of applying brute-force search to functional programming automation is presented and compared with a conventional genetic programming method. From the information of the type and the property that should be satisfied, this algorithm is able to find automatically

A Brute Force Search of DES Keyspace

by Matt Curtin, Justin Dolske , 1997
"... The Data Encryption Standard (DES) has been the workhorse of cryptography for some 20 years. Its wide deployment and now-small key size make it an interesting target for attackers. This paper discusses the first public "crack" of a DES-encrypted message using brute force, and shows how ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The Data Encryption Standard (DES) has been the workhorse of cryptography for some 20 years. Its wide deployment and now-small key size make it an interesting target for attackers. This paper discusses the first public "crack" of a DES-encrypted message using brute force, and shows

Brute force searching, the typical set and Guesswork

by Mark M. Christiansen, Ken R. Duffy, Flávio Du Pin Calmon, Muriel Médard
"... Abstract—Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker’s difficulty, its Guesswork, in identifying the chosen word. ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract—Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker’s difficulty, its Guesswork, in identifying the chosen word. It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded words are drawn from a source’s typical set and so, for all intents and purposes, uniformly distributed within it. By applying recent results on Guesswork, for i.i.d. sources it is this equipartition ansatz that we investigate here. In particular, we demonstrate that the expected Guesswork for a source conditioned to create words in the typical set grows, with word length, at a lower exponential rate than that of the uniform approximation, suggesting use of the approximation is ill-advised. I.

A survey of Russian approaches to perebor (brute-force search) algorithms

by B. A. Trakhtenbrot - Annals of the History of Computing , 1984
"... Concerns about computational problems requiring brute-force or exhaustive search methods have gained particular attention in recent years because of the widespread research on the “P = NP? ” question. The Russian word for “bruteforce search ” is “perebor. ” It has been an active research area in the ..."
Abstract - Cited by 41 (0 self) - Add to MetaCart
Concerns about computational problems requiring brute-force or exhaustive search methods have gained particular attention in recent years because of the widespread research on the “P = NP? ” question. The Russian word for “bruteforce search ” is “perebor. ” It has been an active research area

Biologically-Inspired Face Detection: Non-Brute-Force-Search Approach

by Christian Siagian , Laurent Itti - FIRST IEEE INTERNATIONAL WORKSHOP ON FACE PROCESSING IN VIDEO , 2004
"... We present a biologically-inspired face detection system. The system applies notions such as saliency, gist, and gaze to localize a face without performing blind spatial search. The saliency model consists of highly parallel low-level computations that operate in domains such as intensity, orientati ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
We present a biologically-inspired face detection system. The system applies notions such as saliency, gist, and gaze to localize a face without performing blind spatial search. The saliency model consists of highly parallel low-level computations that operate in domains such as intensity

Brute Force Search and Oracle-Based Computation (Extended Abstract)

by Ryan Williams
"... ..."
Abstract - Add to MetaCart
Abstract not found

References [1] T. S. Anantharaman, M. Campbell, and F.-h. Hsu. Singular extensions:

by Akihiro Kishimoto , 2014
"... Adding selectivity to brute-force searching. Artificial Intelligence, 43(1):99– ..."
Abstract - Add to MetaCart
Adding selectivity to brute-force searching. Artificial Intelligence, 43(1):99–

Local Search: Is brute-force avoidable?

by Michael R. Fellows, Frances A. Rosamond, Fedor V. Fomin, Daniel Lokshtanov, Saket Saurabh, Yngve Villanger
"... Many local search algorithms are based on searching in the k-exchange neighborhood. This is the set of solutions that can be obtained from the current solution by exchanging at most k elements. As a rule of thumb, the larger k is, the better are the chances of finding an improved solution. However, ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
, for inputs of size n, a naïve brute-force search of the k-exchange neighborhood requires nO(k) time, which is not practical even for very small values of k. We show that for several classes of sparse graphs, like planar graphs, graphs of bounded vertex degree and graphs excluding some fixed graph as a minor
Next 10 →
Results 1 - 10 of 475
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University