Sciweavers

6274 search results - page 1060 / 1255
» From query complexity to computational complexity
Sort
View
133
Voted
JOC
2008
92views more  JOC 2008»
15 years 5 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
150
Voted
KES
2006
Springer
15 years 5 months ago
Intelligent Environment for Training of Power Systems Operators
Training of operators has become an important problem to be faced by power systems: updating knowledge and skills. An operator must comprehend the physical operation of the process...
Gustavo Arroyo-Figueroa, Yasmín Herná...
KI
2006
Springer
15 years 5 months ago
GeTS - A Specification Language for Geo-Temporal Notions
This document describes the `Geo-Temporal' specification language GeTS. The objects which can be described and manipulated with this language are time points, crisp and fuzzy...
Hans Jürgen Ohlbach
IANDC
2007
151views more  IANDC 2007»
15 years 5 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
PRL
2008
213views more  PRL 2008»
15 years 5 months ago
Boosting recombined weak classifiers
Boosting is a set of methods for the construction of classifier ensembles. The differential feature of these methods is that they allow to obtain a strong classifier from the comb...
Juan José Rodríguez, Jesús Ma...
« Prev « First page 1060 / 1255 Last » Next »