Sciweavers

3907 search results - page 157 / 782
» Time, Knowledge, and Choice
Sort
View
ICDAR
2005
IEEE
15 years 10 months ago
Text/Graphic labelling of Ancient Printed Documents
This paper presents a text/graphic labelling for ancient printed documents. Our approach is based on the extraction and the quantification of the various orientations that are pre...
Nicholas Journet, Véronique Eglin, Jean-Yve...
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
15 years 10 months ago
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
This work proposes a compact implementation of the AES S-box using composite field arithmetic in GF(((22 ) 2 ) 2 ). It describes a systematic exploration of different choices for...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
ITS
2004
Springer
153views Multimedia» more  ITS 2004»
15 years 10 months ago
Modeling Students' Reasoning About Qualitative Physics: Heuristics for Abductive Proof Search
Abstract. We describe a theorem prover that is used in the Why2Atlas tutoring system for the purposes of evaluating the correctness of a student’s essay and for guiding feedback ...
Maxim Makatchev, Pamela W. Jordan, Kurt VanLehn
ICDT
2010
ACM
172views Database» more  ICDT 2010»
15 years 9 months ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
149
Voted
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 8 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst