Sciweavers

1898 search results - page 109 / 380
» Weak Keys for IDEA
Sort
View
ISMIS
2005
Springer
14 years 2 months ago
Bitmap Index-Based Decision Trees
In this paper we propose an original approach to apply data mining algorithms, namely decision tree-based methods, taking into account not only the size of processed databases but ...
Cécile Favre, Fadila Bentayeb
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
14 years 2 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the ļ¬rst multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
ICDAR
2003
IEEE
14 years 2 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
APSEC
2000
IEEE
14 years 1 months ago
An adaptive distributed workflow system framework
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
Martin K. Purvis, Maryam Purvis, Selena Lemalu
ATAL
2006
Springer
14 years 18 days ago
Information-theoretic approaches to branching in search
Deciding what to branch on at each node is a key element of search algorithms. We present four families of methods for selecting what question to branch on. They are all informati...
Andrew Gilpin, Tuomas Sandholm