Sciweavers

981 search results - page 89 / 197
» Advanced Encryption Standard
Sort
View
VAST
2004
ACM
14 years 2 months ago
iClay: Digitizing Cuneiform
Advances in digital technology for the graphic and textual representation of manuscripts have not, until recently, been applied to the worldʼs oldest manuscripts, cuneiform table...
Jonathan D. Cohen, Donald Duncan, Dean Snyder, Jer...
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
14 years 1 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
CORR
2002
Springer
95views Education» more  CORR 2002»
13 years 8 months ago
Value Based Argumentation Frameworks
In many cases of disagreement it is impossible to demonstrate that either party is wrong. The role of argument in such cases is to persuade rather than refute. Following Perelman, ...
Trevor J. M. Bench-Capon
ICPR
2010
IEEE
14 years 2 months ago
The Detection of Concept Frames Using Clustering Multi-Instance Learning
Abstract—The classification of sequences requires the combination of information from different time points. In this paper the detection of facial expressions is considered. Exp...
David Tax, Michel Valstar
APL
1994
ACM
14 years 29 days ago
The Impact of APL on First Year Mathematics
ct In 1993, the Australian Federal Government's Committee for the Advancement of University Teaching (CAUT) funded a project to develop an integrated computationally rich firs...
Walter G. Spunde