Sciweavers

51692 search results - page 10224 / 10339
» at 2008
Sort
View
100
Voted
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
14 years 11 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
106
Voted
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
14 years 11 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...
93
Voted
AAAI
2010
14 years 11 months ago
Efficient Lifting for Online Probabilistic Inference
Lifting can greatly reduce the cost of inference on firstorder probabilistic graphical models, but constructing the lifted network can itself be quite costly. In online applicatio...
Aniruddh Nath, Pedro Domingos
81
Voted
DRR
2008
14 years 11 months ago
Hybrid approach combining contextual and statistical information for identifying MEDLINE citation terms
There is a strong demand for developing automated tools for extracting pertinent information from the biomedical literature that is a rich, complex, and dramatically growing resou...
In-Cheol Kim, Daniel X. Le, George R. Thoma
102
Voted
ECIR
2008
Springer
14 years 11 months ago
Filaments of Meaning in Word Space
Word space models, in the sense of vector space models built on distributional data taken from texts, are used to model semantic relations between words. We argue that the high dim...
Jussi Karlgren, Anders Holst, Magnus Sahlgren
« Prev « First page 10224 / 10339 Last » Next »