Sciweavers

2084 search results - page 343 / 417
» Knowledge Exploitation from the Web
Sort
View
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 10 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
CLEF
2010
Springer
13 years 10 months ago
A Multi Cue Discriminative Approach to Semantic Place Classification
This paper describes the participation of Idiap-MULTI to the Robot Vision Task at imageCLEF 2010. Our approach was based on a discriminative classification algorithm using multiple...
Marco Fornoni, Jesus Martínez-Gómez,...
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 9 months ago
A Meta-Programming Approach to Realizing Dependently Typed Logic Programming
Dependently typed lambda calculi such as the Logical Framework (LF) can encode relationships between terms in types and can naturally capture correspondences between formulas and ...
Zachary Snow, David Baelde, Gopalan Nadathur
ESWA
2008
113views more  ESWA 2008»
13 years 9 months ago
Taxonomy alignment for interoperability between heterogeneous virtual organizations
Resources in virtual organizations are classified based on their local taxonomies. However, heterogeneity between these taxonomies is a serious problem for efficient cooperation p...
Jason J. Jung
JAL
2008
89views more  JAL 2008»
13 years 9 months ago
Experimenting with parallelism for the instantiation of ASP programs
Abstract. In the last few years, the microprocessors technologies have been definitely moving to multi-core architectures, in order to improve performances as well as reduce power ...
Francesco Calimeri, Simona Perri, Francesco Ricca