Sciweavers

8770 search results - page 1439 / 1754
» Named Service Networking
Sort
View
MSE
1999
IEEE
118views Hardware» more  MSE 1999»
15 years 8 months ago
Training IP Creators and Integrators
Intellectual property IP blocks are being created for reuse and marketed as a means of reducing the development time of complex designs. This in turn leads to a reduction in time ...
Donald W. Bouldin, Senthil Natarajan, Benjamin A. ...
PAKDD
1998
ACM
103views Data Mining» more  PAKDD 1998»
15 years 8 months ago
Discovering Case Knowledge Using Data Mining
The use of Data Mining in removing current bottlenecks within Case-based Reasoning (CBR) systems is investigated along with the possible role of CBR in providing a knowledge manag...
Sarabjot S. Anand, David W. Patterson, John G. Hug...
COMPGEOM
1997
ACM
15 years 8 months ago
Realistic Input Models for Geometric Algorithms
Many algorithms developed in computational geometry are needlessly complicated and slow because they have to be prepared for very complicated, hypothetical inputs. To avoid this, ...
Mark de Berg, Matthew J. Katz, A. Frank van der St...
HT
1997
ACM
15 years 8 months ago
Structuring and Visualising the WWW by Generalised Similarity Analysis
This paper describes a generic approach to structuring and visualising a hypertext-based information space on the WWW. This approach, called Generalised Similarity Analysis (GSA),...
Chaomei Chen
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 8 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
« Prev « First page 1439 / 1754 Last » Next »