Sciweavers

1756 search results - page 261 / 352
» Current Directions in Hyper-Programming
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 8 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
KDD
1997
ACM
128views Data Mining» more  KDD 1997»
15 years 8 months ago
An Interactive Visualization Environment for Data Exploration
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
Mark Derthick, John Kolojejchick, Steven F. Roth
MCMASTER
1993
15 years 8 months ago
A Taste of Rewrite Systems
Abstract. This survey of the theory and applications of rewriting with equations discusses the existence and uniqueness of normal forms, the Knuth-Bendix completion procedure and i...
Nachum Dershowitz
SIGOPSE
1990
ACM
15 years 8 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...
EDUTAINMENT
2007
Springer
15 years 8 months ago
View-Dependent Hierarchical Foliage Simplification
High compression of plant geometry is an important aspect in fast realistic visualization of plants. Hierarchical structuring plant morphology is a key factor for real time plant r...
Qingqiong Deng, Xiaopeng Zhang, Marc Jaeger