Sciweavers

14379 search results - page 7 / 2876
» is 2000
Sort
View
SIGKDD
2000
92views more  SIGKDD 2000»
14 years 10 months ago
WEBKDD 2000 - Web Mining for E-Commerce
In this paper, we provide a summary of the WEBKDD 2000 workshop, whose theme was `Web Mining for E-Commerce'. This workshop was held in conjunction with the ACM SIGKDD Intern...
Myra Spiliopoulou, Jaideep Srivastava, Ron Kohavi,...
ICIP
2002
IEEE
15 years 12 months ago
Flexible, dynamic and compliant region of interest coding in JPEG2000
Image transmission with JPEG2000 can be speeded up by using regions of interest (RoIs). By such a mechanism, parts of an image not belonging to RoIs can be transmitted later or en...
René Rosenbaum, Heidrun Schumann
99
Voted
AGENTS
2001
Springer
15 years 2 months ago
ATTac-2000: an adaptive autonomous bidding agent
The First Trading Agent Competition TAC was held from June 22nd to July 8th, 2000. TAC was designed to create a benchmark problem in the complex domain of emarketplaces and to m...
Peter Stone, Michael L. Littman, Satinder P. Singh...
ISCAS
2003
IEEE
116views Hardware» more  ISCAS 2003»
15 years 3 months ago
Effective hardware-oriented technique for the rate control of JPEG2000 encoding
A great deal of computation for JPEG2000 encoding is a redundancy when the compression rate is high. That is because many coded bit-streams will be truncated after the rate contro...
Te-Hao Chang, Chung-Jr Lian, Hong-Hui Chen, Jing-Y...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 8 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu