Sciweavers

940 search results - page 46 / 188
» New Cryptanalytic Results on IDEA
Sort
View
WSC
2001
14 years 11 months ago
Sizing a pilot production line using simulation
The semiconductor industry is rapidly expanding worldwide. With the continuing advancement of technology, companies are continually striving to develop and maintain cutting edge p...
Peng Qu, Geoffrey E. Skinner, Scott J. Mason
DKE
2008
87views more  DKE 2008»
14 years 9 months ago
Region clustering based evaluation of multiple top-N selection queries
In many database applications, there are opportunities for multiple top-N queries to be evaluated at the same time. Often it is more cost effective to evaluate multiple such queri...
Liang Zhu, Weiyi Meng, Wenzhu Yang, Chunnian Liu
JUCS
2008
159views more  JUCS 2008»
14 years 9 months ago
Two Step Swarm Intelligence to Solve the Feature Selection Problem
: In this paper we propose a new approach to Swarm Intelligence called Two-Step Swarm Intelligence. The basic idea is to split the heuristic search performed by agents into two sta...
Yudel Gómez, Rafael Bello, Amilkar Puris, M...
ICISC
2000
126views Cryptology» more  ICISC 2000»
14 years 11 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
NAACL
2004
14 years 11 months ago
Evaluating Multiple Aspects of Coherence in Student Essays
CriterionSM Online Essay Evaluation Service includes a capability that labels sentences in student writing with essay-based discourse elements (e.g., thesis statements). We descri...
Derrick Higgins, Jill Burstein, Daniel Marcu, Clau...