Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
In genetic programming, the reproductive operators of crossover and mutation both require the selection of nodes from the reproducing individuals. Both unbiased random selection a...
—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated freque...
—We explore distributed mechanisms for maintaining the physical layer connectivity of a mobile wireless network while still permitting significant area coverage. Moreover, we re...
Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zu...
The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14 102 diver...
Urmimala Sarkar, Andrew J. Karter, Jennifer Y. Liu...