Sciweavers

1898 search results - page 175 / 380
» Weak Keys for IDEA
Sort
View
WSC
2000
13 years 10 months ago
Applications of business process simulation and lean techniques in British Telecommunications PLC
Business processes are increasingly key to the success of companies in the service industry. It is important that these processes are designed and maintained to deliver the most c...
Simon Dennis, Ben C. King, Martin Hind, Stewart Ro...
WCE
2007
13 years 10 months ago
Wavepackets in the Recognition of Isolated Handwritten Characters
— This work is to apply wavelet packet transformation for the recognition of isolated handwritten Malayalam (one of the south Indian languages) characters. The key idea is that c...
G. Raju, K. Revathy
WEWORC
2007
129views Cryptology» more  WEWORC 2007»
13 years 10 months ago
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
This paper presents two key-recovery attacks against the last modication to Achterbahn-128/80 proposed by the authors at SASC 2007 due to the previous attacks. The 80-bit variant,...
María Naya-Plasencia
FUNGAMES
2008
13 years 10 months ago
Hypercomputation, Unconsciousness and Entertainment Technology
Recent developments in computer science introduce and discuss new concepts for computation beyond universal Turing machines. Quantum computing relates to new insights in quantum ph...
Matthias Rauterberg
ICML
2010
IEEE
13 years 10 months ago
Graded Multilabel Classification: The Ordinal Case
We propose a generalization of multilabel classification that we refer to as graded multilabel classification. The key idea is that, instead of requesting a yes-no answer to the q...
Weiwei Cheng, Krzysztof Dembczynski, Eyke Hül...