Sciweavers

2767 search results - page 306 / 554
» Knowledge Relativity
Sort
View
FSE
1999
Springer
137views Cryptology» more  FSE 1999»
14 years 1 months ago
Linear Cryptanalysis of RC5 and RC6
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (blocksize 64) with 10 rou...
Johan Borst, Bart Preneel, Joos Vandewalle
ICRA
1998
IEEE
137views Robotics» more  ICRA 1998»
14 years 1 months ago
GRAMMPS: A Generalized Mission Planner for Multiple Mobile Robots in Unstructured Environments
For a system of cooperative mobile robots to be effective in real-world applications, it must be able to efficiently execute a wide class of complex tasks in potentially unknown a...
Barry Brumitt, Anthony Stentz
IPPS
1998
IEEE
14 years 1 months ago
High Performance Data Mining Using Data Cubes on Parallel Computers
On-Line Analytical Processing techniques are used for data analysis and decision support systems. The multidimensionality of the underlying data is well represented by multidimens...
Sanjay Goil, Alok N. Choudhary
VISUAL
1999
Springer
14 years 1 months ago
From Gaze to Focus of Attention
Identifying human gaze or eye-movement ultimately serves the purpose of identifying an individual’s focus of attention. The knowledge of a person’s object of interest helps us...
Rainer Stiefelhagen, Michael Finke, Jie Yang, Alex...
SRDS
1998
IEEE
14 years 1 months ago
Tolerating Visitor Location Register Failures in Mobile Environments
For mobile users who move frequently but receive relatively rare calls, a forwarding scheme has been shown to outperform the normal IS-41 location management scheme. But the forwa...
Saad Biaz, Nitin H. Vaidya