Sciweavers

1898 search results - page 93 / 380
» Weak Keys for IDEA
Sort
View
JOLLI
2002
74views more  JOLLI 2002»
13 years 8 months ago
Referent Systems and Relational Grammar
Abstract. Relational Grammar (RG) was introduced in the 70's as a theory of grammatical relations and relation change, for example, passivization, dative shift, and raising. F...
Marcus Kracht
IR
2010
13 years 7 months ago
Adapting boosting for information retrieval measures
Abstract We present a new ranking algorithm that combines the strengths of two previous methods: boosted tree classification, and LambdaRank, which has been shown to be empiricall...
Qiang Wu, Christopher J. C. Burges, Krysta Marie S...
ICWN
2009
13 years 6 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
JOCN
2010
85views more  JOCN 2010»
13 years 3 months ago
Defining the Units of Competition: Influences of Perceptual Organization on Competitive Interactions in Human Visual Cortex
Multiple stimuli that are present simultaneously in the visual field compete for neural representation. At the same time, however, multiple stimuli in cluttered scenes also underg...
Stephanie A. McMains, Sabine Kastner
TIT
2008
79views more  TIT 2008»
13 years 8 months ago
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
We develop a couple of new methods to reduce transmission overheads in broadcast encryption. The methods are based on the idea of assigning one key per each partition using one-way...
Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Su...