Sciweavers

8486 search results - page 1647 / 1698
» Ordered Enumeration Method
Sort
View
ICISC
1998
110views Cryptology» more  ICISC 1998»
13 years 11 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
AAAI
1997
13 years 11 months ago
Case and Constraint-Based Apartment Construction Project Planning System: FASTrak-APT
To effectively generate a fast and consistent apartment construction project network, Hyundai and KAIST have developed a case and constraint based project planning expert system f...
Kyoung Jun Lee, Hyun Woo Kim, Jae Kyu Lee, Tae Hwa...
AAAI
1997
13 years 11 months ago
PST: The Provider Selection Tool
Oxford Health Plans, Inc. is a managed care organization whose goal is to deliver cost-effective, high-quality health care. Oxford’s product lines include traditional health mai...
Howard Marmorstein, Jayesh Ghia, Sandeep Sathaye, ...
ANLP
1997
169views more  ANLP 1997»
13 years 11 months ago
Building Effective Queries In Natural Language Information Retrieval
In this paper we report on our natural language information retrieval (NLIR) project as related to the recently concluded 5th Text Retrieval Conference (TREC-5). The main thrust o...
Tomek Strzalkowski, Fang Lin, Jose Perez Carballo,...
COOTS
1997
13 years 11 months ago
MiSFIT: A Tool for Constructing Safe Extensible C++ Systems
The boundary between application and system is becoming increasingly permeable. Extensible applications, such as web browsers, database systems, and operating systems, demonstrate...
Christopher Small
« Prev « First page 1647 / 1698 Last » Next »