Sciweavers

4095 search results - page 525 / 819
» How to test a tree
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 5 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
ECIS
2003
15 years 5 months ago
Internet enabled supply chain integration for SMEs
Electronic business has a strong influence on the relationships between partners within supply chains. Small and Medium Sized Enterprises (SMEs) need an affordable, integrated set...
Michal Zaremba, Brian Wall, Jim Browne, Szymon Zal...
NIPS
2004
15 years 5 months ago
Responding to Modalities with Different Latencies
Motor control depends on sensory feedback in multiple modalities with different latencies. In this paper we consider within the framework of reinforcement learning how different s...
Fredrik Bissmarck, Hiroyuki Nakahara, Kenji Doya, ...
IADIS
2003
15 years 5 months ago
Model Driven Fast Prototyping: A Semantic Approach
Sure that quality applications must be well thought and described before the development phase and that a design methodology can be much more than a help in most occasions, we pro...
Luca Contursi, Roberto Paiano, Andrea Pandurino
RIAO
2004
15 years 5 months ago
Monitoring User-System Performance in Interactive Retrieval Tasks
Monitoring user-system performance in interactive search is a challenging task. Traditional measures of retrieval evaluation, based on recall and precision, are not of any use in ...
Liudmila V. Boldareva, Arjen P. de Vries, Djoerd H...