Sciweavers

11573 search results - page 2106 / 2315
» Designing Relational Databases
Sort
View
129
Voted
ATAL
2003
Springer
15 years 9 months ago
Optimal agendas for multi-issue negotiation
There are two ways of handling bilateral multi-issue negotiations – one is to negotiate all the issues together, and the other is to negotiate them one by one. The order in whic...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
JCDL
2010
ACM
163views Education» more  JCDL 2010»
15 years 8 months ago
Flexible access to photo libraries via time, place, tags, and visual features
Photo libraries are growing in quantity and size, requiring better support for locating desired photographs. MediaGLOW is an interactive visual workspace designed to address this ...
Andreas Girgensohn, Frank Shipman, Thea Turner, Ly...
ISCAS
2002
IEEE
153views Hardware» more  ISCAS 2002»
15 years 8 months ago
Biological learning modeled in an adaptive floating-gate system
We have implemented an aspect of learning and memory in the nervous system using analog electronics. Using a simple synaptic circuit we realize networks with Hebbian type adaptati...
Christal Gordon, Paul E. Hasler
158
Voted
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 8 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
« Prev « First page 2106 / 2315 Last » Next »