Sciweavers

31 search results - page 6 / 7
» How to Break MD5 and Other Hash Functions
Sort
View
FTDCS
2003
IEEE
13 years 11 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
PLDI
2012
ACM
11 years 8 months ago
The implicit calculus: a new foundation for generic programming
Generic programming (GP) is an increasingly important trend in programming languages. Well-known GP mechanisms, such as type classes and the C++0x concepts proposal, usually combi...
Bruno C. d. S. Oliveira, Tom Schrijvers, Wontae Ch...
ALGORITHMICA
1998
73views more  ALGORITHMICA 1998»
13 years 5 months ago
Linear Probing and Graphs
Mallows and Riordan showed in 1968 that labeled trees with a small number of inversions are related to labeled graphs that are connected and sparse. Wright enumerated sparse connec...
Donald E. Knuth
COCO
2006
Springer
93views Algorithms» more  COCO 2006»
13 years 9 months ago
Making Hard Problems Harder
We consider a general approach to the hoary problem of (im)proving circuit lower bounds. We define notions of hardness condensing and hardness extraction, in analogy to the corres...
Joshua Buresh-Oppenheim, Rahul Santhanam
ACHI
2009
IEEE
14 years 17 days ago
From Isolation to Communication: A Case Study Evaluation of Robot Assisted Play for Children with Autism with a Minimally Expres
– The general context of the work presented in this paper is assistive robotics with our long-term aim to support children with autism. This paper is part of the Aurora project t...
Ben Robins, Kerstin Dautenhahn, Paul Dickerson