Sciweavers

1487 search results - page 179 / 298
» Two Kinds of Metonymy
Sort
View
INDOCRYPT
2005
Springer
14 years 2 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
IVA
2005
Springer
14 years 2 months ago
Integrating Social Skills in Task-Oriented 3D IVA
Abstract. This paper presents a set of mechanisms oriented to incorporate social information into the decision taking of task-oriented 3DIVA. The aim of this approach is to integra...
Francisco Grimaldo, Miguel Lozano, Fernando Barber...
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
14 years 2 months ago
Mining closed relational graphs with connectivity constraints
Relational graphs are widely used in modeling large scale networks such as biological networks and social networks. In this kind of graph, connectivity becomes critical in identif...
Xifeng Yan, Xianghong Jasmine Zhou, Jiawei Han
MIDDLEWARE
2005
Springer
14 years 2 months ago
Functional and architectural adaptation in pervasive computing environments
Service-oriented computing paradigm encourages the use of dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive...
Nanjangud C. Narendra, Umesh Bellur, S. K. Nandy, ...
PVM
2005
Springer
14 years 2 months ago
A Case for New MPI Fortran Bindings
Abstract. The Fortran language has evolved substantially from the Fortran 77 bindings defined in the MPI-1 (Message Passing Interface) standard. Fortran 90 introduced interface bl...
Craig Edward Rasmussen, Jeffrey M. Squyres