Sciweavers

7065 search results - page 1306 / 1413
» Iterative Scheduling Algorithms
Sort
View
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
15 years 6 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul
AAAI
2010
15 years 6 months ago
Prioritization of Domain-Specific Web Information Extraction
It is often desirable to extract structured information from raw web pages for better information browsing, query answering, and pattern mining. Many such Information Extraction (...
Jian Huang, Cong Yu
ICVGIP
2008
15 years 6 months ago
Visibility Cuts: A System for Rendering Dynamic Virtual Environments
In recent years, the subject of occlusion culling of large 3D environments has received substantial contribution. However the major amount of research into the area has focussed o...
Soumyajit Deb, Ankit Gupta
IIWAS
2008
15 years 6 months ago
Double-agent architecture for collaborative supply chain formation
Supply chains have evolved to web-applications that tap on the power of internet to expand their networks online. Recently some research attention is focused on make-to-order supp...
Yang Hang, Simon Fong
AIPS
2004
15 years 6 months ago
Guiding Planner Backjumping Using Verifier Traces
In this paper, we show how a planner can use a modelchecking verifier to guide state space search. In our work on hard real-time, closed-loop planning, we use a modelchecker'...
Robert P. Goldman, Michael J. S. Pelican, David J....
« Prev « First page 1306 / 1413 Last » Next »