Sciweavers

1898 search results - page 35 / 380
» Weak Keys for IDEA
Sort
View
HICSS
2005
IEEE
152views Biometrics» more  HICSS 2005»
14 years 2 months ago
Formation of an Online Community of Practice: An Inductive Study Unearthing Key Elements
Informal conversations occur all day long among employees. These conversations allow employees to share experience such as innovative ideas for performing a task. Internalizing th...
Lori Baker-Eveleth, Suprateek Sarker, Daniel M. Ev...
ACISP
2005
Springer
14 years 2 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen
MASA
2001
Springer
14 years 1 months ago
Intelligent Agents: The Key Concepts
This chapter aims to introduce the reader to the basic issues surrounding the design and implementation of intelligent agents. It begins by motivating the idea of an agent, present...
Michael Wooldridge
CSB
2003
IEEE
14 years 1 months ago
An SVM-based Algorithm for Identification of Photosynthesis-specific Genome Features
This paper presents a novel algorithm for identification and functional characterization of “key” genome features responsible for a particular biochemical process of interest....
Gong-Xin Yu, George Ostrouchov, Al Geist, Nagiza F...
IFL
2000
Springer
135views Formal Methods» more  IFL 2000»
14 years 7 days ago
Freja, Hat and Hood - A Comparative Evaluation of Three Systems for Tracing and Debugging Lazy Functional Programs
Abstract. In this paper we compare three systems for tracing and debugging Haskell programs: Freja, Hat and Hood. We evaluate their usefulness in practice by applying them to a num...
Olaf Chitil, Colin Runciman, Malcolm Wallace