Sciweavers

1675 search results - page 147 / 335
» The Value of a Good Name
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 3 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
DMSN
2004
ACM
14 years 3 months ago
Predictive filtering: a learning-based approach to data stream filtering
Recent years have witnessed an increasing interest in filtering of distributed data streams, such as those produced by networked sensors. The focus is to conserve bandwidth and se...
Vibhore Kumar, Brian F. Cooper, Shamkant B. Navath...
GECCO
2004
Springer
14 years 3 months ago
Experimental Evaluation of Discretization Schemes for Rule Induction
This paper proposes an experimental evaluation of various discretization schemes in three different evolutionary systems for inductive concept learning. The various discretization...
Jesús S. Aguilar-Ruiz, Jaume Bacardit, Fede...
GECCO
2004
Springer
14 years 3 months ago
Validating a Model of Colon Colouration Using an Evolution Strategy with Adaptive Approximations
The colour of colon tissue, which depends on the tissue structure, its optical properties, and the quantities of the pigments present in it, can be predicted by a physics-based mod...
Dzena Hidovic, Jonathan E. Rowe
ATS
2000
IEEE
134views Hardware» more  ATS 2000»
14 years 2 months ago
Fsimac: a fault simulator for asynchronous sequential circuits
At very high frequencies, the major potential of asynchronous circuits is absence of clock skew and, through that, better exploitation of relative timing relations. This paper pre...
Susmita Sur-Kolay, Marly Roncken, Ken S. Stevens, ...