Sciweavers

202 search results - page 26 / 41
» ideal 2004
Sort
View
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
15 years 2 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
ICADL
2004
Springer
110views Education» more  ICADL 2004»
15 years 2 months ago
Hot-Spot Passage Retrieval in Question Answering
Question Answering has been the recent focus of information retrieval research; many systems just incorporate a search engine as a black box and most effort has been devoted to the...
Jian Huang, Xuanjing Huang, Lide Wu
79
Voted
IFL
2004
Springer
138views Formal Methods» more  IFL 2004»
15 years 2 months ago
A Rational Deconstruction of Landin's SECD Machine
Landin’s SECD machine was the first abstract machine for the λ-calculus viewed as a programming language. Both theoretically as a model of computation and practically as an ide...
Olivier Danvy
ISMIR
2004
Springer
112views Music» more  ISMIR 2004»
15 years 2 months ago
Towards Characterisation of Music via Rhythmic Patterns
A central problem in music information retrieval is finding suitable representations which enable efficient and accurate computation of musical similarity and identity. Low leve...
Simon Dixon, Fabien Gouyon, Gerhard Widmer
MATA
2004
Springer
199views Communications» more  MATA 2004»
15 years 2 months ago
Configuration Management for Networked Reconfigurable Embedded Devices
Distribution of product updates to embedded devices can increase product lifetimes for consumers and boost revenues for vendors. Dynamic provisioning of application solutions to e...
Timothy O'Sullivan, Richard Studdert