Sciweavers

1702 search results - page 322 / 341
» Hidden Pattern Statistics
Sort
View
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
DIGRA
2005
Springer
15 years 3 months ago
Contexts, pleasures and preferences: girls playing computer games
In this paper, issues of girls and their gaming preferences are explored through observations of computer games sessions at an all-girl state school. What emerged is that preferen...
Diane Carr
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 3 months ago
A hardware pipeline for function optimization using genetic algorithms
Genetic Algorithms (GAs) are very commonly used as function optimizers, basically due to their search capability. A number of different serial and parallel versions of GA exist. ...
Malay Kumar Pakhira, Rajat K. De
MLCW
2005
Springer
15 years 3 months ago
Evaluating Predictive Uncertainty Challenge
This Chapter presents the PASCAL1 Evaluating Predictive Uncertainty Challenge, introduces the contributed Chapters by the participants who obtained outstanding results, and provide...
Joaquin Quiñonero Candela, Carl Edward Rasm...
CIKM
2004
Springer
15 years 3 months ago
Hierarchical document categorization with support vector machines
Automatically categorizing documents into pre-defined topic hierarchies or taxonomies is a crucial step in knowledge and content management. Standard machine learning techniques ...
Lijuan Cai, Thomas Hofmann