Sciweavers

1652 search results - page 261 / 331
» Power Iteration Clustering
Sort
View
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
15 years 2 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
KDD
1997
ACM
221views Data Mining» more  KDD 1997»
15 years 2 months ago
MineSet: An Integrated System for Data Mining
MineSetTM , Silicon Graphics’ interactive system for data mining, integrates three powerful technologies: database access, analytical data mining, and data visualization. It sup...
Clifford Brunk, James Kelly, Ron Kohavi
DAC
1994
ACM
15 years 1 months ago
Exact and Approximate Methods for Calculating Signal and Transition Probabilities in FSMs
In this paper, we consider the problem of calculating the signal and transition probabilities of the internal nodes of the combinational logic part of a nite state machine (FSM). ...
Chi-Ying Tsui, Massoud Pedram, Alvin M. Despain
SMA
1993
ACM
107views Solid Modeling» more  SMA 1993»
15 years 1 months ago
Relaxed parametric design with probabilistic constraints
: Parametric design is an important modeling paradigm in computer aided design. Relationships (constraints) between the degrees of freedom (DOFs) of the model, instead of the DOFs ...
Yacov Hel-Or, Ari Rappoport, Michael Werman
ERLANG
2007
ACM
15 years 1 months ago
Extended process registry for Erlang
The built-in process registry has proven to be an extremely useful feature of the Erlang language. It makes it easy to provide named services, which can be reached without knowing...
Ulf Wiger