Sciweavers

4419 search results - page 785 / 884
» Information Science in Transition
Sort
View
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
MC
2003
157views Computer Science» more  MC 2003»
14 years 11 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky
CASCON
1996
134views Education» more  CASCON 1996»
14 years 11 months ago
Paradigm shift in software re-engineering: an experience report
Software re-engineering is one of the solutions advocated for the problems that are encountered during maintenance. The three major phases of a re-engineering process are (i) reve...
Kasilingam Periyasamy, C. Mathew
ISMB
1993
14 years 11 months ago
Pattern Discovery in Gene Regulation: Designing an Analysis Environment
Interactions that determinecellular fate are exceedingly complex, can take place at different levels of gene regulation and involve a large numberof components(such as genes, prot...
Stella Veretnik, Bruce R. Schatz
NAACL
1994
14 years 11 months ago
A Report of Recent Progress in Transformation-Based Error-Driven Learning
Most recent research in trainable part of speech taggers has explored stochastic tagging. While these taggers obtain high accuracy, linguistic information is captured indirectly, ...
Eric Brill