Sciweavers

7890 search results - page 1386 / 1578
» The MathSAT 3 System
Sort
View
120
Voted
CCS
2007
ACM
15 years 11 months ago
Compact FPGA implementations of QUAD
QUAD is a stream cipher whose provable security relies on the hardness of solving systems of multivariate quadratic equations. This paper explores FPGA implementations of the stre...
David Arditti, Côme Berbain, Olivier Billet,...
125
Voted
CLEF
2007
Springer
15 years 11 months ago
Question Answering with Joost at CLEF 2007
We describe our system for the monolingual Dutch and multilingual English to Dutch QA tasks. First, we present a brief overview of our QA-system, which makes heavy use of syntacti...
Gosse Bouma, Geert Kloosterman, Jori Mur, Gertjan ...
DRM
2007
Springer
15 years 11 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
FROCOS
2007
Springer
15 years 11 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
15 years 11 months ago
A genetic algorithm for resident physician scheduling problem
This paper formally presents the resident physician scheduling problem, which is one of the most important scheduling problems in hospital. The resident physician scheduling probl...
Chi-Way Wang, Lei-Ming Sun, Ming-Hui Jin, Chung-Ju...
« Prev « First page 1386 / 1578 Last » Next »