Sciweavers

35419 search results - page 131 / 7084
» How are we doing
Sort
View
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
15 years 7 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
CORR
2002
Springer
86views Education» more  CORR 2002»
15 years 3 months ago
The Management of Context-Sensitive Features: A Review of Strategies
In this paper, we review five heuristic strategies for handling context-sensitive features in supervised machine learning from examples. We discuss two methods for recovering lost...
Peter D. Turney
ECSCW
1993
15 years 5 months ago
Supporting The Design Process Within An Organisational Context
: This paper attempts to take what has been essentially abstract thinking about how to support the design process and relocates it within the working and organisational context of ...
Bob Anderson, Graham Button, Wes Sharrock
113
Voted
ECCV
2008
Springer
16 years 5 months ago
Cat Head Detection - How to Effectively Exploit Shape and Texture Features
In this paper, we focus on the problem of detecting the head of cat-like animals, adopting cat as a test case. We show that the performance depends crucially on how to effectively ...
Weiwei Zhang, Jian Sun, Xiaoou Tang
IWPSE
2005
IEEE
15 years 9 months ago
How Developers Drive Software Evolution
As systems evolve their structure change in ways not expected upfront. As time goes by, the knowledge of the developers becomes more and more critical for the process of understan...
Tudor Gîrba, Adrian Kuhn, Mauricio Seeberger...