Public-key cryptographic systems often involve raising elements of some group (e.g., GF 2 n , Z/NZ, or elliptic curves) to large powers. An important question is how fast this exponentiation can be done, which often determines whether a given system is practical. The best method for exponentiation d
Methods of case adaptation: A survey
β Scribed by Rudradeb Mitra; Jayanta Basak
- Publisher
- John Wiley and Sons
- Year
- 2005
- Tongue
- English
- Weight
- 664 KB
- Volume
- 20
- Category
- Article
- ISSN
- 0884-8173
No coin nor oath required. For personal study only.
β¦ Synopsis
In this article, we provide an overview of the case adaptation process. We classify various existing case adaptation methods available in the literature. We consider three different aspects, namely, domain knowledge requirement, adaptive capabilities of the case adaptation methods, and the kind of adaptation knowledge required. We then derive certain findings about the nature of the case adaptation methods and their applicability in real-life tasks.
π SIMILAR VOLUMES
## Abstract Authorship attribution supported by statistical or computational methods has a long history starting from the 19th century and is marked by the seminal study of Mosteller and Wallace (1964) on the authorship of the disputed βFederalist Papers.β During the last decade, this scientific fi
The knowledge of the 10 inertia parameters mass, centre of gravity and inertia tensor (moments and products of inertia) of mechanical systems is of great interest whenever the dynamic behaviour is signi"cantly governed by these parameters. In this paper, a survey of currently available inertia param