Sciweavers

2659 search results - page 105 / 532
» Do we mean the same
Sort
View
JOC
2000
130views more  JOC 2000»
15 years 4 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
APWEB
2004
Springer
15 years 10 months ago
Generalized Inclusion Dependencies in XML
Abstract. Integrity constraints play a fundamental role in defining semantics in both conventional databases and in XML documents. In this paper we generalize previous approaches ...
Millist W. Vincent, Michael Schrefl, Jixue Liu, Ch...
128
Voted
SMILE
1998
Springer
15 years 8 months ago
Tensor Embedding of the Fundamental Matrix
We revisit the bilinear matching constraint between two perspective views of a 3D scene. Our objective is to represent the constraint in the same manner and form as the trilinear ...
Shai Avidan, Amnon Shashua
155
Voted
EWCBR
2008
Springer
15 years 6 months ago
Discovering Feature Weights for Feature-based Indexing of Q-tables
In this paper we propose an approach to address the old problem of identifying the feature conditions under which a gaming strategy can be effective. For doing this, we will build ...
Chad Hogg, Stephen Lee-Urban, Bryan Auslander, H&e...
WWW
2011
ACM
14 years 11 months ago
Growing parallel paths for entity-page discovery
In this paper, we use the structural and relational information on the Web to find entity-pages. Specifically, given a Web site and an entity-page (e.g., department and faculty ...
Tim Weninger, Fabio Fumarola, Cindy Xide Lin, Rick...