A survey of AOR and TOR methods
β Scribed by Jiaoxun Kuang; Jun Ji
- Publisher
- Elsevier Science
- Year
- 1988
- Tongue
- English
- Weight
- 677 KB
- Volume
- 24
- Category
- Article
- ISSN
- 0377-0427
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
In this article, we provide an overview of the case adaptation process. We classify various existing case adaptation methods available in the literature. We consider three different aspects, namely, domain knowledge requirement, adaptive capabilities of the case adaptation methods, and the kind of a
Public-key cryptographic systems often involve raising elements of some group (e.g., GF 2 n , Z/NZ, or elliptic curves) to large powers. An important question is how fast this exponentiation can be done, which often determines whether a given system is practical. The best method for exponentiation d
## Abstract Authorship attribution supported by statistical or computational methods has a long history starting from the 19th century and is marked by the seminal study of Mosteller and Wallace (1964) on the authorship of the disputed βFederalist Papers.β During the last decade, this scientific fi