Sciweavers

2786 search results - page 139 / 558
» A Practical Technique for Process Abstraction
Sort
View
ECAI
2004
Springer
15 years 7 months ago
Tractable Symmetry Breaking Using Restricted Search Trees
We present a new conceptual abstraction in symmetry breaking – the GE-tree. The construction and traversal of a GE-tree breaks all symmetries in any constraint satisfaction or si...
Colva M. Roney-Dougal, Ian P. Gent, Tom Kelsey, St...
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
15 years 7 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
15 years 6 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
92
Voted
CARDIS
1998
Springer
121views Hardware» more  CARDIS 1998»
15 years 6 months ago
Efficient Smart-Card Based Anonymous Fingerprinting
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...
PPOPP
2011
ACM
14 years 4 months ago
Time skewing made simple
Time skewing and loop tiling has been known for a long time to be a highly beneficial acceleration technique for nested loops especially on bandwidth hungry multi-core processors...
Robert Strzodka, Mohammed Shaheen, Dawid Pajak