咨询与建议

限定检索结果

文献类型

  • 4 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 工学
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 1 篇 linear feedback ...
  • 1 篇 computer science
  • 1 篇 information syst...
  • 1 篇 neurons
  • 1 篇 multi-layer neur...
  • 1 篇 computational co...
  • 1 篇 computer archite...
  • 1 篇 systems engineer...
  • 1 篇 radiofrequency i...
  • 1 篇 neural networks
  • 1 篇 interference
  • 1 篇 national electri...
  • 1 篇 websites
  • 1 篇 logic functions
  • 1 篇 costs
  • 1 篇 algorithm design...
  • 1 篇 hash functions
  • 1 篇 information secu...
  • 1 篇 hardware
  • 1 篇 artificial neura...

机构

  • 1 篇 systems design e...
  • 1 篇 fac. of comput. ...
  • 1 篇 dep. of inf. and...
  • 1 篇 electronics & el...
  • 1 篇 dpt of inf. and ...
  • 1 篇 department of in...
  • 1 篇 dpt of computer ...

作者

  • 1 篇 h.m. el-bakry
  • 1 篇 rizomiliotis pan...
  • 1 篇 m.s. kamel
  • 1 篇 panagiotis rizom...
  • 1 篇 anagnostopoulos ...
  • 1 篇 charalampopoulos...
  • 1 篇 m.a. abo-elsoud

语言

  • 4 篇 英文
检索条件"机构=Dpt of Inf. and Comm. Systems Engineering"
4 条 记 录,以下是1-10 订阅
排序:
A comparable study employing weka clustering/classification algorithms for web page classification
A comparable study employing weka clustering/classification ...
收藏 引用
15th Panhellenic Conference on inf.rmatics, PCI 2011
作者: Charalampopoulos, Ioannis Anagnostopoulos, Ioannis Dpt of Inf. and Comm. Systems Engineering University of Aegean Karlovassi Samos island Greece Dpt of Computer Science and Biomedical Informatics University of Central Greece Lamia Greece
Documents and web pages share many similarities. Thus classification methods used in documents can be applied to advanced web content, with or even without modifications. Algorithms for document and web classification... 详细信息
来源: 评论
Misusing universal hash functions: Security analysis of a hardware efficient stream cipher model using LFSR based hash function
Misusing universal hash functions: Security analysis of a ha...
收藏 引用
IEEE inf.rmation Theory Workshop 2010, ITW 2010
作者: Rizomiliotis, Panagiotis Dep. of Inf. and Comm. Systems Engineering University of the Aegean Karlovassi Samos GR-83200 Greece
Hardware efficient encryption algorithms are necessary for applications like low cost Radio Frequency Identification (RFID) tags. In order to keep the cost as low as possible, the designers of lightweight algorithms a... 详细信息
来源: 评论
Misusing universal hash functions: security analysis of a hardware efficient stream cipher model using LFSR based hash function
Misusing universal hash functions: security analysis of a ha...
收藏 引用
IEEE (first ITW conference of the year) inf.rmation Theory Workshop (ITW)
作者: Panagiotis Rizomiliotis Department of Inf. and Comm. Systems Engineering University of Aegean Samos Greece
Hardware efficient encryption algorithms are necessary for applications like low cost Radio Frequency Identification (RFID) tags. In order to keep the cost as low as possible, the designers of lightweight algorithms a... 详细信息
来源: 评论
Modular neural networks for solving high complexity tasks
Modular neural networks for solving high complexity tasks
收藏 引用
IEEE International Symposium on Circuits and systems (ISCAS)
作者: H.M. El-Bakry M.A. Abo-Elsoud M.S. Kamel Fac. of Comput. Sci. & Inf. Syst. Mansoura Univ. Egypt Electronics & Elec Comm. Department Faculty of Engineering Mansoura University Egypt Systems Design Engineering Department University of Waterloo Canada
In this paper, we introduce a powerful solution for complex problems which are required to be solved using neural nets. This is done by using modular neural nets (MNNs) that divide the input space into several homogen... 详细信息
来源: 评论