Sciweavers

2625 search results - page 43 / 525
» Applications 2000
Sort
View
CHES
2000
Springer
97views Cryptology» more  CHES 2000»
15 years 3 months ago
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis
This paper shows how a well-balanced trade-off between a generic workstation and dumb but fast reconfigurable hardware can lead to a more efficient implementation of a cryptanalysi...
Thomas Pornin, Jacques Stern
IWSAS
2000
Springer
15 years 3 months ago
An Architecture for Self-Adaptation and Its Application to Aerial Image Understanding
Abstract. Certain problems in which the environment is not well constrained do not lend themselves to a conventional open loop solution. Image understanding is such a problem domai...
Paul Robertson
PKDD
2000
Springer
108views Data Mining» more  PKDD 2000»
15 years 3 months ago
Application of Reinforcement Learning to Electrical Power System Closed-Loop Emergency Control
This paper investigates the use of reinforcement learning in electric power system emergency control. The approach consists of using numerical simulations together with on-policy M...
Christophe Druet, Damien Ernst, Louis Wehenkel
VLDB
2000
ACM
110views Database» more  VLDB 2000»
15 years 3 months ago
Evolution of Groupware for Business Applications: A Database Perspective on Lotus Domino/Notes
In this paper, we first introduce the database aspects of the groupware product Lotus Domino/Notes and then describe, in some more detail, many of the logging and recovery enhance...
C. Mohan, Ron Barber, S. Watts, Amit Somani, Marko...
COLING
2000
15 years 1 months ago
Chart-Based Transfer Rule Application in Machine Translation
35"ansfer-based Machine Translation systems require a procedure for choosing the set; of transfer rules for generating a target language translation from a given source langu...
Adam Meyers, Michiko Kosaka, Ralph Grishman