Sciweavers

3602 search results - page 127 / 721
» Isn't It About Time
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 1 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
KDD
1995
ACM
99views Data Mining» more  KDD 1995»
14 years 1 months ago
Knowledge Discovery in a Water Quality Database
Weapply rule induction to mine for knowledgein a database which stores data obtained by monitoring the water quality of the rivers in Slovenia. The database contains measurementda...
Saso Dzeroski
IJCAI
2007
13 years 11 months ago
Argumentation Based Contract Monitoring in Uncertain Domains
Few existing argumentation frameworks are designed to deal with probabilistic knowledge, and none are designed to represent possibilistic knowledge, making them unsuitable for man...
Nir Oren, Timothy J. Norman, Alun D. Preece
AAAI
2006
13 years 11 months ago
Belief Change in the Context of Fallible Actions and Observations
We consider the iterated belief change that occurs following an alternating sequence of actions and observations. At each instant, an agent has some beliefs about the action that ...
Aaron Hunter, James P. Delgrande
SIMVIS
2004
13 years 11 months ago
3D Shape Matching Using Skeleton Graphs
We describe a method to match 3D polygonal geometry models using their internal skeleton graphs. These graphs carry information about the overall shape of the model. In order to m...
Angela Brennecke, Tobias Isenberg