Sciweavers

2435 search results - page 192 / 487
» Intellexer Question Answering
Sort
View
AES
2004
Springer
139views Cryptology» more  AES 2004»
15 years 9 months ago
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, ...
Nicolas Courtois
JELIA
2004
Springer
15 years 9 months ago
Logic Programming Infrastructure for Inferences on FrameNet
Abstract. The growing size of electronically available text corpora like companies’ intranets or the WWW has made information access a hot topic within computational linguistics....
Peter Baumgartner, Aljoscha Burchardt
WEBDB
2004
Springer
143views Database» more  WEBDB 2004»
15 years 9 months ago
DTDs versus XML Schema: A Practical Study
Among the various proposals answering the shortcomings of Document Type Definitions (DTDs), XML Schema is the most widely used. Although DTDs and XML Schema Defintions (XSDs) di...
Geert Jan Bex, Frank Neven, Jan Van den Bussche
HICSS
2000
IEEE
107views Biometrics» more  HICSS 2000»
15 years 8 months ago
A Project Management Model based on Shared Understanding
Traditionally in industrial system development, the total project is decomposed into phases. The result from one phase, normally a document or a system component, is passed to the...
Ulf Cederling, Roland Ekinge, Bengt Lennartsson, L...
ASIACRYPT
2000
Springer
15 years 8 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre