Sciweavers

1009 search results - page 183 / 202
» Correlations of Partial Words
Sort
View
ENC
2005
IEEE
14 years 1 months ago
Hard Problem Generation for MKP
We developed generators that produce challenging MKP instances. Our approaches uses independently exponential distributions over a wide range to generate the constraint coefficien...
Maria A. Osorio, Germn Cuaya
ASIACRYPT
2005
Springer
14 years 29 days ago
A Practical Attack on the Fixed RC4 in the WEP Mode
In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also kno...
Itsik Mantin
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 24 days ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
SIGIR
2003
ACM
14 years 20 days ago
Query length in interactive information retrieval
Query length in best-match information retrieval (IR) systems is well known to be positively related to effectiveness in the IR task, when measured in experimental, non-interactiv...
Nicholas J. Belkin, Diane Kelly, G. Kim, Ja-Young ...
DAS
2010
Springer
14 years 6 days ago
Analysis of whole-book recognition
Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images, attempting to improve accuracy by automatic unsupervised ...
Pingping Xiu, Henry S. Baird