Sciweavers

6269 search results - page 228 / 1254
» Turning data into knowledge
Sort
View
155
Voted
FPL
1997
Springer
242views Hardware» more  FPL 1997»
15 years 9 months ago
Technology mapping by binate covering
Technology mapping can be viewed as the optimization problem of finding a minimum cost cover of the given Boolean network by choosing from given library of logic cells. The core of...
Michal Servít, Kang Yi
CEEMAS
2007
Springer
15 years 9 months ago
Exploring Social Networks in Request for Proposal Dynamic Coalition Formation Problems
In farsighted MAS, every agent is aware of each other, and so they can evaluate the outcomes of their interaction in an efficient way. However, this farsighted knowledge becomes an...
Carlos Mérida-Campos, Steven Willmott
ICASSP
2009
IEEE
15 years 9 months ago
Graphical Models: Statistical inference vs. determination
Using discrete Hidden-Markov-Models (HMMs) for recognition requires the quantization of the continuous feature vectors. In handwritten whiteboard note recognition it turns out tha...
Joachim Schenk, Benedikt Hörnler, Artur Braun...
ASIACRYPT
2008
Springer
15 years 7 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
COCOON
2008
Springer
15 years 7 months ago
On the Complexity of Equilibria Problems in Angel-Daemon Games
We analyze the complexity of equilibria problems for a class of strategic zero-sum games, called Angel-Daemon games. Those games were introduced to asses the goodness of a web or g...
Joaquim Gabarró, Alina García, Maria...