Sciweavers

5799 search results - page 238 / 1160
» Position Paper
Sort
View
JECR
2000
157views more  JECR 2000»
15 years 3 months ago
Optimizing Human-Computer Interaction for the Electronic Commerce Environment
The paper investigates the interaction effects between the search strategy of software agents and the subject's product class knowledge. The experimental study consists of a ...
Rex Eugene Perera
TCBB
2010
104views more  TCBB 2010»
15 years 2 months ago
Fast Hinge Detection Algorithms for Flexible Protein Structures
— Analysis of conformational changes is one of the keys to the understanding of protein functions and interactions. For the analysis, we often compare two protein structures, tak...
Tetsuo Shibuya
ASE
2011
14 years 7 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
ISPEC
2011
Springer
14 years 7 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
AES
2004
Springer
139views Cryptology» more  AES 2004»
15 years 9 months ago
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers
This paper is motivated by the design of AES. We consider a broader question of cryptanalysis of block ciphers having very good non-linearity and diffusion. Can we expect anyway, ...
Nicolas Courtois