Sciweavers

2344 search results - page 263 / 469
» Generating from a Deep Structure
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
15 years 7 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
116
Voted
CGI
2004
IEEE
15 years 7 months ago
Computer Aided Design for Origamic Architecture Models with Polygonal Representation
An Origamic Architecture (OA) is a folded sheet of perforated paper from which a three-dimensional structure "pops up" when it is opened. It is similar to a "pop-up...
Jun Mitani, Hiromasa Suzuki
HYBRID
2000
Springer
15 years 6 months ago
Towards Procedures for Systematically Deriving Hybrid Models of Complex Systems
Abstract. In many cases, complex system behaviors are naturally modeled as nonlinear differential equations. However, these equations are often hard to analyze because of "sti...
Pieter J. Mosterman, Gautam Biswas
RIAO
2004
15 years 4 months ago
Group Memory Based on the Task Information
A group memory of a project is an information space storing the documents produced and exchanged by members of the group, which may include the electronic discussions that took pl...
Jonathan Yu, James A. Thom, Leila Alem
COMPUTER
2008
66views more  COMPUTER 2008»
15 years 3 months ago
Into the Wild: Low-Cost Ubicomp Prototype Testing
ions and techniques such as activity models, storyboards, and programming by demonstration (Y. Li and J. Landay, "Activity-Based Prototyping of Ubicomp Applications for Long-L...
Yang Li, James A. Landay