Sciweavers

631 search results - page 62 / 127
» Why Model
Sort
View
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
SME E-Procurement Adoption in Hong Kong - The Roles of Power, Trust and Value
The objective of this research is to test a model of electronic procurement (e-procurement) adoption behavior by Small- to Medium-sized Enterprises (SME). We investigate the pheno...
Joyce K. Y. Chan, Matthew K. O. Lee
BIRTHDAY
2003
Springer
14 years 2 months ago
Important Aspect of Knowledge Management
In this paper it is explained what Knowledge Management (KM) is and why it will play an important role in the future. This implies that KM is indeed more than just the sophisticate...
Hermann A. Maurer
ICANN
2003
Springer
14 years 2 months ago
Dimensionality Reduction through Sensory-Motor Coordination
The problem of category learning has been traditionally investigated by employing disembodied categorization models. One of the basic tenets of embodied cognitive science states th...
I. René J. A. te Boekhorst, Max Lungarella,...
BIRTHDAY
2009
Springer
14 years 1 months ago
Pervasive Theory of Memory
For many aspects of memory theoretical treatment already exists, in particular for: simple cache construction, store buers and store buer forwarding, cache coherence protocols, o...
Ulan Degenbaev, Wolfgang J. Paul, Norbert Schirmer