Sciweavers

3686 search results - page 537 / 738
» Comprehensive comprehensions
Sort
View
119
Voted
VLSISP
2008
145views more  VLSISP 2008»
15 years 3 months ago
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box
Cryptographic substitution boxes (S-boxes) are an integral part of modern block ciphers like the Advanced Encryption Standard (AES). There exists a rich literature devoted to the ...
Stefan Tillich, Martin Feldhofer, Thomas Popp, Joh...
246
Voted
AIR
2002
165views more  AIR 2002»
15 years 3 months ago
Evolutionary Algorithms for Multi-Objective Optimization: Performance Assessments and Comparisons
The rapid advances of evolutionary methods for multi-objective (MO) optimization poses the difficulty of keeping track of the developments in this field as well as selecting an app...
Kay Chen Tan, Tong Heng Lee, Eik Fun Khor
149
Voted
ASC
2004
15 years 3 months ago
Extracting rules from trained neural network using GA for managing E-business
Theabilitytointelligentlycollect,manageandanalyzeinformationaboutcustomersandsellersisakeysourceofcompetitive advantage for an e-business. This ability provides an opportunity to ...
Atta Ebrahim E. ElAlfi, R. Haque, M. Esmel ElAlami
129
Voted
CANDC
2004
ACM
15 years 3 months ago
Cycling in ecological networks: Finn's index revisited
A chief cybernetic feature of natural living systems is the recycling of nutrients, which tends to enhance stability and is one of the principal causes of ecosystem complexity. In...
Stefano Allesina, Robert E. Ulanowicz
154
Voted
COGSCI
2004
136views more  COGSCI 2004»
15 years 3 months ago
Generation and evaluation of user tailored responses in multimodal dialogue
When people engage in conversation, they tailor their utterances to their conversational partners, whether these partners are other humans or computational systems. This tailoring...
Marilyn A. Walker, Steve Whittaker, Amanda Stent, ...