Sciweavers

1341 search results - page 171 / 269
» Periods in Extensions of Words
Sort
View
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
ICSE
2001
IEEE-ACM
14 years 3 months ago
Functional Paleontology: System Evolution as the User Sees It
It has long been accepted that requirements analysis should precede architectural design and implementation, but in software evolution and reverse engineering this concern with bl...
Annie I. Antón, Colin Potts
INFOCOM
1997
IEEE
14 years 3 months ago
A Near-Optimal Packet Scheduler for QoS Networks
A packet scheduler in a quality-of-service QoS network should be sophisticated enough to support stringent QoS constraints at high loads, but it must also have a simple implemen...
Dallas E. Wrege, Jörg Liebeherr
CIKM
2008
Springer
14 years 23 days ago
Learning the distance metric in a personal ontology
Personal ontology construction is the task of sorting through relevant materials, identifying the main topics and concepts, and organizing them to suit personal needs. Automatic c...
Hui Yang, Jamie Callan
ECIS
2001
14 years 5 days ago
Knowledge management systems: A health care initiative with lessons for us all
We are not only in a new millennium but also a new era. A variety of terms such as the Post-Industrial Era (Huber, 1990), the Information Age (Shapiro et al, 1999), the Third Wave...
Nilmini Wickramasinghe, Gail L. Mills