Sciweavers

934 search results - page 29 / 187
» context 2003
Sort
View
FSE
2003
Springer
243views Cryptology» more  FSE 2003»
15 years 2 months ago
Optimal Key Ranking Procedures in a Statistical Cryptanalysis
Hypothesis tests have been used in the past as a tool in a cryptanalytic context. In this paper, we propose to use this paradigm and define a precise and sound statistical framewo...
Pascal Junod, Serge Vaudenay
MDBIS
2003
132views Database» more  MDBIS 2003»
14 years 11 months ago
Cache-supported Processing of Queries in Mobile DBS
: The usage of mobile equipment like PDAs, mobile phones, Tablet PCs or laptops is already common in our current information society. Typically, mobile information systems work in ...
Hagen Höpfner, Kai-Uwe Sattler
76
Voted
INTERACT
2003
14 years 11 months ago
Constructed Narratives: Using Play to Breakdown Social
: Constructed Narratives is both a human computer interaction research project and interactive art exploration that demonstrates methods by which rigorous research and aesthetic an...
Pamela Jennings
ECIS
2003
14 years 11 months ago
The adoption of information systems in SMEs: organizational issues and success factors
This research approaches the issues of introducing ICTs (Information and Communication Technologies) into Small and Medium Enterprises, with the aim of finding some conditions tha...
Angelo Caruso, Michela Marchiori
ICANN
2003
Springer
15 years 2 months ago
Knowledge Refinement Using Fuzzy Compositional Neural Networks
Fuzzy relations as representational tools and fuzzy compositional operators as reasoning components, are user in this paper in order to represent knowledge expressed in semantic ru...
Vassilis Tzouvaras, Giorgos B. Stamou, Stefanos D....