Sciweavers

10304 search results - page 2028 / 2061
» Computer science with the sciences: an emphasis in computati...
Sort
View
76
Voted
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
DALT
2008
Springer
14 years 11 months ago
Abstracting and Verifying Strategy-Proofness for Auction Mechanisms
ing and Verifying Strategy-proofness for Auction Mechanisms E. M. Tadjouddine, F. Guerin, and W. Vasconcelos Department of Computing Science, King's College, University of Abe...
Emmanuel M. Tadjouddine, Frank Guerin, Wamberto We...
ESA
2008
Springer
148views Algorithms» more  ESA 2008»
14 years 11 months ago
Selfish Bin Packing
Following recent interest in the study of computer science problems in a game theoretic setting, we consider the well known bin packing problem where the items are controlled by se...
Leah Epstein, Elena Kleiman
DAGSTUHL
2010
14 years 11 months ago
Patient-Specific Mappings between Myocardial and Coronary Anatomy
The segmentation of the myocardium based on the 17-segment model as recommended by the American Heart Association is widely used in medical practice. The patient-specific coronary...
Maurice Termeer, Javier Oliván Bescó...
EDM
2010
248views Data Mining» more  EDM 2010»
14 years 11 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
« Prev « First page 2028 / 2061 Last » Next »