Sciweavers

1730 search results - page 130 / 346
» Algebra and Computation
Sort
View
144
Voted
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 4 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
CMSB
2009
Springer
15 years 7 months ago
Equivalence and Discretisation in Bio-PEPA
Bio-PEPA is a process algebra for modelling biological systems. An important aspect of Bio-PEPA is the ability it provides to discretise concentrations resulting in a smaller, more...
Vashti Galpin, Jane Hillston
108
Voted
CSL
2005
Springer
15 years 6 months ago
Feasible Proofs of Matrix Properties with Csanky's Algorithm
We show that Csanky’s fast parallel algorithm for computing the characteristic polynomial of a matrix can be formalized in the logical theory LAP, and can be proved correct in LA...
Michael Soltys
115
Voted
SC
2009
ACM
15 years 5 months ago
Comparative study of one-sided factorizations with multiple software packages on multi-core hardware
The emergence and continuing use of multi-core architectures require changes in the existing software and sometimes even a redesign of the established algorithms in order to take ...
Emmanuel Agullo, Bilel Hadri, Hatem Ltaief, Jack D...
IPSN
2009
Springer
15 years 7 months ago
Algebraic approach to recovering topological information in distributed camera networks
Camera networks are widely used for tasks such as surveillance, monitoring and tracking. In order to accomplish these tasks, knowledge of localization information such as camera l...
Edgar J. Lobaton, Parvez Ahammad, Shankar Sastry