Sciweavers

1245 search results - page 160 / 249
» Binary Sparse Coding
Sort
View
ICISC
2007
152views Cryptology» more  ICISC 2007»
15 years 4 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
PROCEDIA
2010
86views more  PROCEDIA 2010»
15 years 1 months ago
Scaling of ab-initio nuclear physics calculations on multicore computer architectures
We discuss the scaling behavior of a state-of-the-art Configuration Interaction code for nuclear physics on modern multicore computer architectures. In the CI approach, the quant...
Pieter Maris, Masha Sosonkina, James P. Vary, Esmo...
122
Voted
DCC
2002
IEEE
16 years 2 months ago
PPMexe: PPM for Compressing Software
With the emergence of software delivery platforms such as Microsoft's .NET, code compression has become one of the core enabling technologies strongly affecting system perfor...
Milenko Drinic, Darko Kirovski
DSN
2005
IEEE
15 years 9 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
EXPCS
2007
15 years 7 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...