Sciweavers

101 search results - page 18 / 21
» Complexity Analysis of Weak Multitolerance
Sort
View
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
15 years 1 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
ICCBR
1995
Springer
15 years 1 months ago
On the use of CBR in optimisation problems such as the TSP
The particular strength of CBR is normally considered to be its use in weak theory domains where solution quality is compiled into cases and is reusable. In this paper we explore a...
Padraig Cunningham, Barry Smyth, Neil J. Hurley
ITP
2010
230views Mathematics» more  ITP 2010»
14 years 11 months ago
On the Formalization of the Lebesgue Integration Theory in HOL
Lebesgue integration is a fundamental concept in many mathematical theories, such as real analysis, probability and information theory. Reported higher-order-logic formalizations o...
Tarek Mhamdi, Osman Hasan, Sofiène Tahar
LREC
2010
175views Education» more  LREC 2010»
14 years 11 months ago
Ad-hoc Evaluations Along the Lifecycle of Industrial Spoken Dialogue Systems: Heading to Harmonisation?
With a view to rationalise the evaluation process within the Orange Labs spoken dialogue system projects, a field audit has been realised among the various related professionals. ...
Marianne Laurent, Philippe Bretier, Carole Manquil...
WSC
1998
14 years 10 months ago
Using Simulation in Call Centers
A company's call center is its most visible strategic weapon. It is a business battlefront where millions of dollars of products and services are purchased, sold, and traded....
Vivek Bapat, Eddie B. Pruitte Jr.