Sciweavers

9841 search results - page 166 / 1969
» Distributed Value Functions
Sort
View
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 8 months ago
Optimal Timing for Software Functionality Additions by Internet Portals
Managerial decisions regarding software functionality additions at Internet portals are interesting to senior managers involved in e-commerce. Portals can leverage software functi...
Robert J. Kauffman, Amy Ping Wu
SSC
2007
Springer
192views Cryptology» more  SSC 2007»
15 years 8 months ago
On Boolean Functions Which Are Bent and Negabent
Bent functions f : Fm 2 → F2 achieve largest distance to all linear functions. Equivalently, their spectrum with respect to the Hadamard-Walsh transform is flat (i.e. all spectr...
Matthew G. Parker, Alexander Pott
JOI
2007
99views more  JOI 2007»
15 years 2 months ago
Measuring quality of similarity functions in approximate data matching
This paper presents a method for assessing the quality of similarity functions. The scenario taken into account is that of approximate data matching, in which it is necessary to d...
Roberto da Silva, Raquel Kolitski Stasiu, Viviane ...
SIGARCH
2002
57views more  SIGARCH 2002»
15 years 2 months ago
An improved index function for (D)FCM predictors
The most promising value predictors to date are the finite context method predictor and a recent improvement thereof, the differential finite context method predictor. Both predic...
Martin Burtscher
EUROCRYPT
2005
Springer
15 years 8 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu