Sciweavers

499 search results - page 29 / 100
» Why neighbor-joining works
Sort
View
EUSAI
2003
Springer
14 years 3 months ago
Applications of Vision-Based Attention-Guided Perceptive Devices to Aware Environments
This paper discusses a computer vision based approach for enhancing a physical environment with machine perception. Using techniques for assessing the distance and orientation of a...
Bogdan Raducanu, Panos Markopoulos
NLDB
2001
Springer
14 years 2 months ago
Experiments with the Use of Syntactic Analysis in Information Retrieval
: Up to now, the results of applying sophisticated NL techniques to IR have been mostly disappointing. Our research aims at investigating in detail the role of syntactic analysis i...
Markus Mittendorfer, Werner Winiwarter
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
14 years 2 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
PEPM
1998
ACM
14 years 2 months ago
Eta-Redexes in Partial Evaluation
Abstract. Source-program modifications can make a partial evaluator yield dramatically better results. For example, eta-redexes can preserve static data flow by acting as an interf...
Jens Palsberg
AIML
2008
13 years 11 months ago
Three 13th-century views of quantified modal logic
There are two reasons why medieval logic is of interest to modern logician: One is to see how similar it is to modern logic and the other is to see how different it is. We study th...
Sara L. Uckelman