Sciweavers

5105 search results - page 186 / 1021
» Approximate Structural Consistency
Sort
View
SSC
2007
Springer
161views Cryptology» more  SSC 2007»
15 years 10 months ago
On Attacks on Filtering Generators Using Linear Subspace Structures
Abstract. The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a ke...
Sondre Rønjom, Guang Gong, Tor Helleseth
ICDAR
2005
IEEE
15 years 9 months ago
Data categorization for a context return applied to logical document structure recognition
The purpose of this work is to develop a pattern recognition system simulating the human vision. A transparent neural network, with context returns is used. The context returns co...
Yves Rangoni, Abdel Belaïd
LCN
2005
IEEE
15 years 9 months ago
Fault Tolerant Active Rings for Structured Peer-to-Peer Overlays
Algorithms by which peers join and leave structured overlay networks can be classified as passive or active. Passive topology maintenance relies on periodic background repair of n...
John Risson, Ken Robinson, Tim Moors
GCC
2004
Springer
15 years 9 months ago
Gemini: Probabilistic Routing Algorithm in Structured P2P Overlay
In this paper, we propose a new structured overlay protocol, which is more efficient and scalable than previous ones. We call it Gemini, because its routing table consists of two p...
Ming Li, Jinfeng Hu, Haitao Dong, Dongsheng Wang, ...
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
15 years 9 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry