Sciweavers

14379 search results - page 7 / 2876
» is 2000
Sort
View
SIGKDD
2000
92views more  SIGKDD 2000»
15 years 4 days ago
WEBKDD 2000 - Web Mining for E-Commerce
In this paper, we provide a summary of the WEBKDD 2000 workshop, whose theme was `Web Mining for E-Commerce'. This workshop was held in conjunction with the ACM SIGKDD Intern...
Myra Spiliopoulou, Jaideep Srivastava, Ron Kohavi,...
93
Voted
ICIP
2002
IEEE
16 years 2 months ago
Flexible, dynamic and compliant region of interest coding in JPEG2000
Image transmission with JPEG2000 can be speeded up by using regions of interest (RoIs). By such a mechanism, parts of an image not belonging to RoIs can be transmitted later or en...
René Rosenbaum, Heidrun Schumann
117
Voted
AGENTS
2001
Springer
15 years 4 months ago
ATTac-2000: an adaptive autonomous bidding agent
The First Trading Agent Competition TAC was held from June 22nd to July 8th, 2000. TAC was designed to create a benchmark problem in the complex domain of emarketplaces and to m...
Peter Stone, Michael L. Littman, Satinder P. Singh...
99
Voted
ISCAS
2003
IEEE
116views Hardware» more  ISCAS 2003»
15 years 5 months ago
Effective hardware-oriented technique for the rate control of JPEG2000 encoding
A great deal of computation for JPEG2000 encoding is a redundancy when the compression rate is high. That is because many coded bit-streams will be truncated after the rate contro...
Te-Hao Chang, Chung-Jr Lian, Hong-Hui Chen, Jing-Y...
89
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 10 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu