Sciweavers

4266 search results - page 666 / 854
» Search for More Declarativity
Sort
View
ICCAD
1997
IEEE
121views Hardware» more  ICCAD 1997»
14 years 1 months ago
Adaptive methods for netlist partitioning
An algorithm that remains in use at the core of many partitioning systems is the Kernighan-Lin algorithm and a variant the Fidducia-Matheysses (FM) algorithm. To understand the FM...
Wray L. Buntine, Lixin Su, A. Richard Newton, Andr...
ROBOCUP
1998
Springer
156views Robotics» more  ROBOCUP 1998»
14 years 1 months ago
Cooperative Behavior Acquisition in a Multiple Mobile Robot Environment by Co-evolution
Co-evolution has been receiving increased attention as a method for multi agent simultaneous learning. This paper discusses how multiple robots can emerge cooperative behaviors thr...
Eiji Uchibe, Masateru Nakamura, Minoru Asada
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 1 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
CHI
1997
ACM
14 years 1 months ago
Artificial Intelligence Techniques in the Interface to a Digital Video Library
For the huge amounts of audio and video material that could usefully be included in digital libraries, the cost of producing human-generated annotations and meta-data is prohibiti...
Alexander G. Hauptmann, Michael J. Witbrock, Micha...
HT
1997
ACM
14 years 1 months ago
What the Query Told the Link: The Integration of Hypertext and Information Retrieval
Traditionally hypertexts have been limited in size by the manual effort required to create hypertext links. In addition, large hyper–linked collections may overwhelm users with ...
Gene Golovchinsky