Sciweavers

2725 search results - page 405 / 545
» A framework for P2P application development
Sort
View
ASIACRYPT
2010
Springer
15 years 1 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
ICDM
2010
IEEE
264views Data Mining» more  ICDM 2010»
15 years 1 months ago
Block-GP: Scalable Gaussian Process Regression for Multimodal Data
Regression problems on massive data sets are ubiquitous in many application domains including the Internet, earth and space sciences, and finances. In many cases, regression algori...
Kamalika Das, Ashok N. Srivastava
ICLP
2011
Springer
14 years 7 months ago
Transaction Logic with Defaults and Argumentation Theories
Transaction Logic is an extension of classical logic that gracefully integrates both declarative and procedural knowledge and has proved itself as a powerful formalism for many ad...
Paul Fodor, Michael Kifer
LAWEB
2009
IEEE
15 years 10 months ago
Promoting Creative Design through Toolkits
—Computer science academics and professionals typically consider their contributions in terms of the algorithms, applications, and techniques that they develop. Yet equally impor...
Saul Greenberg

Publication
162views
17 years 2 months ago
Use-it or Lose-it Policies for the Available Bit Rate (ABR) Service in ATM Networks
The Available Bit Rate (ABR) service has been developed to support 21st century data applications over Asynchronous Transfer Mode (ATM). The ABR service uses a closed-loop rate-bas...
Shivkumar Kalyanaraman, Raj Jain, Rohit Goyal, Son...