Sciweavers

20745 search results - page 3968 / 4149
» Computer graphics for all
Sort
View
87
Voted
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
103
Voted
DBPL
2005
Springer
143views Database» more  DBPL 2005»
15 years 3 months ago
Inconsistency Tolerance in P2P Data Integration: An Epistemic Logic Approach
We study peer-to-peer ðP2PÞ data integration, where each peer models an autonomous system that exports data in terms of its own schema, and data interoperation is achieved by me...
Diego Calvanese, Giuseppe De Giacomo, Domenico Lem...
83
Voted
DILS
2005
Springer
15 years 3 months ago
PLATCOM: Current Status and Plan for the Next Stages
We have been developing a system for comparing multiple genomes, PLATCOM, where users can choose genomes of their choice freely and perform analysis of the selected genomes with a...
Kwangmin Choi, Jeong-Hyeon Choi, Amit Saple, Zhipi...
88
Voted
DIS
2005
Springer
15 years 3 months ago
Support Vector Inductive Logic Programming
Abstract. In this paper we explore a topic which is at the intersection of two areas of Machine Learning: namely Support Vector Machines (SVMs) and Inductive Logic Programming (ILP...
Stephen Muggleton, Huma Lodhi, Ata Amini, Michael ...
90
Voted
DIS
2005
Springer
15 years 3 months ago
The Arrowsmith Project: 2005 Status Report
In the 1980s, Don Swanson proposed the concept of “undiscovered public knowledge,” and published several examples in which two disparate literatures (i.e., sets of articles hav...
Neil R. Smalheiser
« Prev « First page 3968 / 4149 Last » Next »