Sciweavers

1458 search results - page 119 / 292
» The sequentially realizable functionals
Sort
View
HICSS
1994
IEEE
149views Biometrics» more  HICSS 1994»
15 years 7 months ago
Stochastic Problem Solving by Local Computation Based on Self-Organization Paradigm
We are developing a new problem-solving methodology based on a self-organization paradigm. To realize our future goal of self-organizing computational systems, we have to study co...
Yasusi Kanada, Masao Hirokawa
141
Voted
ICDE
2010
IEEE
200views Database» more  ICDE 2010»
15 years 3 months ago
Towards better entity resolution techniques for Web document collections
— As person names are non-unique, the same name on different Web pages might or might not refer to the same real-world person. This entity identification problem is one of the m...
Surender Reddy Yerva, Zoltán Miklós,...
IJCIM
2007
122views more  IJCIM 2007»
15 years 3 months ago
Implementation approach of ERP with mass customization
: This paper analyzes the shortage of traditional ERP systems in the current dynamic and competitive enterprises environment. The new generation ERP system needs to be frequently c...
Y. Zhao, Y. S. Fan
155
Voted
TALG
2008
124views more  TALG 2008»
15 years 3 months ago
Uniform deterministic dictionaries
Abstract. We present a new analysis of the well-known family of multiplicative hash functions, and improved deterministic algorithms for selecting "good" hash functions. ...
Milan Ruzic
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
14 years 7 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal