Sciweavers

5144 search results - page 878 / 1029
» Enhancing Search with Structure
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
15 years 9 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
218
Voted
SEAAI
1998
Springer
15 years 9 months ago
On theoretical backgrounds of CAD
Abstract. In the past, some information technologies (IT) have quickly been adopted by the engineering practice while the implementation of others has been slower. In the paper, th...
Ziga Turk
ICTAI
1997
IEEE
15 years 9 months ago
Toward the Optimization of a Class of Black Box Optimization Algorithms
Many black box optimization algorithms have sufcient exibility to allow them to adapt to the varying circumstances they encounter. These capabilities are of two primary sorts: 1) ...
Gang Wang, Erik D. Goodman, William F. Punch III
PDIS
1996
IEEE
15 years 9 months ago
Querying the World Wide Web
The World Wide Web is a large, heterogeneous, distributedcollectionof documents connected by hypertext links. The most common technologycurrently used for searching the Web depend...
Alberto O. Mendelzon, George A. Mihaila, Tova Milo
122
Voted
COMPGEOM
1996
ACM
15 years 9 months ago
Simple Traversal of a Subdivision Without Extra Storage
In this paper we show how to traverse a subdivision and to report all cells, edges and vertices, without making use of mark bits in the structure or a stack. We do this by perform...
Mark de Berg, René van Oostrum, Mark H. Ove...