Sciweavers

18306 search results - page 3318 / 3662
» Algorithmics in Exponential Time
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 6 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
161
Voted
GECCO
2011
Springer
248views Optimization» more  GECCO 2011»
14 years 6 months ago
Size-based tournaments for node selection
In genetic programming, the reproductive operators of crossover and mutation both require the selection of nodes from the reproducing individuals. Both unbiased random selection a...
Thomas Helmuth, Lee Spector, Brian Martin
123
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Delay-bounded adaptive UFH-based anti-jamming wireless communication
—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated freque...
Qian Wang, Ping Xu, Kui Ren, Xiang-yang Li
133
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Connectivity maintenance in mobile wireless networks via constrained mobility
—We explore distributed mechanisms for maintaining the physical layer connectivity of a mobile wireless network while still permitting significant area coverage. Moreover, we re...
Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zu...
JAMIA
2011
81views more  JAMIA 2011»
14 years 6 months ago
Social disparities in internet patient portal use in diabetes: evidence that the digital divide extends beyond access
The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14 102 diver...
Urmimala Sarkar, Andrew J. Karter, Jennifer Y. Liu...
« Prev « First page 3318 / 3662 Last » Next »