Sciweavers

2379 search results - page 427 / 476
» Computer Science in the Information Age
Sort
View
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
15 years 5 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
MC
2003
157views Computer Science» more  MC 2003»
15 years 5 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky
CASCON
1996
134views Education» more  CASCON 1996»
15 years 5 months ago
Paradigm shift in software re-engineering: an experience report
Software re-engineering is one of the solutions advocated for the problems that are encountered during maintenance. The three major phases of a re-engineering process are (i) reve...
Kasilingam Periyasamy, C. Mathew
NAACL
1994
15 years 5 months ago
A Report of Recent Progress in Transformation-Based Error-Driven Learning
Most recent research in trainable part of speech taggers has explored stochastic tagging. While these taggers obtain high accuracy, linguistic information is captured indirectly, ...
Eric Brill
WWW
2010
ACM
15 years 4 months ago
Using a model of social dynamics to predict popularity of news
Popularity of content in social media is unequally distributed, with some items receiving a disproportionate share of attention from users. Predicting which newly-submitted items ...
Kristina Lerman, Tad Hogg