Sciweavers

2316 search results - page 149 / 464
» The many forms of hypercomputation
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 4 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
CORR
2010
Springer
161views Education» more  CORR 2010»
15 years 4 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 4 months ago
Joint Source Channel Coding with Side Information Using Hybrid Digital Analog Codes
We study the joint source channel coding problem of transmitting an analog source over a Gaussian channel in two cases - (i) the presence of interference known only to the transmit...
Makesh Pravin Wilson, Krishna R. Narayanan, Giusep...
DEBU
2008
123views more  DEBU 2008»
15 years 4 months ago
Pathfinder: XQuery Off the Relational Shelf
The Pathfinder project makes inventive use of relational database technology--originally developed to process data of strictly tabular shape--to construct efficient database-suppo...
Torsten Grust, Jan Rittinger, Jens Teubner
DM
2008
75views more  DM 2008»
15 years 4 months ago
Homogeneous factorisations of graph products
A homogeneous factorisation of a digraph consists of a partition P = {P1, . . . , Pk} of the arc set A and two vertex-transitive subgroups M G Aut() such that M fixes each Pi set...
Michael Giudici, Cai Heng Li, Primoz Potocnik, Che...