Sciweavers

14078 search results - page 2491 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 7 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
VISSYM
2007
15 years 7 months ago
Multi-Resolution Techniques for Visual Exploration of Large Time-Series Data
Time series are a data type of utmost importance in many domains such as business management and service monitoring. We address the problem of visualizing large time-related data ...
Ming C. Hao, Umeshwar Dayal, Daniel A. Keim, Tobia...
AAAI
2007
15 years 6 months ago
Compact Spectral Bases for Value Function Approximation Using Kronecker Factorization
A new spectral approach to value function approximation has recently been proposed to automatically construct basis functions from samples. Global basis functions called proto-val...
Jeffrey Johns, Sridhar Mahadevan, Chang Wang
AIPS
2007
15 years 6 months ago
Online Planning for Resource Production in Real-Time Strategy Games
Planning in domains with temporal and numerical properties is an important research problem. One application of this is the resource production problem in real-time strategy (RTS)...
Hei Chan, Alan Fern, Soumya Ray, Nick Wilson, Chri...
181
Voted
AUSDM
2008
Springer
237views Data Mining» more  AUSDM 2008»
15 years 6 months ago
On Inconsistencies in Quantifying Strength of Community Structures
Complex network analysis involves the study of the properties of various real world networks. In this broad field, research on community structures forms an important sub area. Th...
Wen Haw Chong
« Prev « First page 2491 / 2816 Last » Next »