Sciweavers

CAI
2007
Springer
13 years 4 months ago
On High-Rate Cryptographic Compression Functions
Abstract. The security of iterated hash functions relies on the properties of underlying compression functions. We study highly efficient compression functions based on block ciphe...
Richard Ostertág, Martin Stanek
CAI
2007
Springer
13 years 6 months ago
Recognizable Picture Languages and Polyominoes
Giusi Castiglione, Roberto Vaglica
CAI
2007
Springer
13 years 8 months ago
Bifinite Chu Spaces
This paper studies colimits of sequences of finite Chu spaces and their ramifications. We consider three base categories of Chu spaces: the generic Chu spaces (C), the extensional ...
Manfred Droste, Guo-Qiang Zhang
CAI
2007
Springer
13 years 10 months ago
The Second Eigenvalue of Random Walks On Symmetric Random Intersection Graphs
Abstract. In this paper we examine spectral properties of random intersection graphs when the number of vertices is equal to the number of labels. We call this class symmetric rand...
Sotiris E. Nikoletseas, Christoforos Raptopoulos, ...
CAI
2007
Springer
13 years 10 months ago
Sturmian and Episturmian Words
Abstract. This survey paper contains a description of some recent results concerning Sturmian and episturmian words, with particular emphasis on central words. We list fourteen cha...
Jean Berstel
CAI
2007
Springer
13 years 10 months ago
Learning Deterministically Recognizable Tree Series - Revisited
Abstract. We generalize a learning algorithm originally devised for deterministic all-accepting weighted tree automata (wta) to the setting of arbitrary deterministic wta. The lear...
Andreas Maletti
CAI
2007
Springer
13 years 10 months ago
From Algebraic Graph Transformation to Adhesive HLR Categories and Systems
In this paper, we present an overview of algebraic graph transformation in the double pushout approach. Basic results concerning independence, parallelism, concurrency, embedding, ...
Ulrike Prange, Hartmut Ehrig