Sciweavers

3618 search results - page 115 / 724
» Additive functions for number systems in function fields
Sort
View
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
15 years 7 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
SEUS
2009
IEEE
15 years 10 months ago
Fine-Grained Tailoring of Component Behaviour for Embedded Systems
Abstract. The application of run-time reconfigurable component models to networked embedded systems has a number of significant advantages such as encouraging software reuse, ada...
Nelson Matthys, Danny Hughes, Sam Michiels, Christ...
CAV
2009
Springer
132views Hardware» more  CAV 2009»
16 years 4 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas
121
Voted
P2P
2005
IEEE
15 years 9 months ago
Finding Rare Data Objects in P2P File-Sharing Systems
Peer-to-peer file-sharing systems have hundreds of thousands of users sharing petabytes of data, however, their search functionality is limited. In general, query results contain...
Wai Gen Yee, Dongmei Jia, Ophir Frieder
ACMDIS
2006
ACM
15 years 10 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...