Sciweavers

4325 search results - page 694 / 865
» Incremental computation with names
Sort
View
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 5 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
WINE
2005
Springer
109views Economy» more  WINE 2005»
15 years 5 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
WIDM
2004
ACM
15 years 5 months ago
Next generation CiteSeer
Abstract. CiteSeer began as the first search engine for scientific literature to incorporate Autonomous Citation Indexing, and has since grown to be a well-used, open archive for...
C. Lee Giles
WMPI
2004
ACM
15 years 5 months ago
SCIMA-SMP: on-chip memory processor architecture for SMP
Abstract. In this paper, we propose a processor architecture with programmable on-chip memory for a high-performance SMP (symmetric multi-processor) node named SCIMA-SMP (Software ...
Chikafumi Takahashi, Masaaki Kondo, Taisuke Boku, ...
CLEF
2004
Springer
15 years 4 months ago
Application of Variable Length N-Gram Vectors to Monolingual and Bilingual Information Retrieval
Our group in the Department of Informatics at the University of Oviedo has participated, for the first time, in two tasks at CLEF: monolingual (Russian) and bilingual (Spanish-to-E...
Daniel Gayo-Avello, Darío Álvarez Gu...