Sciweavers

2797 search results - page 141 / 560
» Code query by example
Sort
View
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
15 years 7 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel
ASWSD
2006
Springer
15 years 6 months ago
Generating Sound and Resource-Aware Code from Hybrid Systems Models
Modern real-time embedded systems are complex, distributed, feature-rich applications. Model-based development of real-time embedded systems promises to simplify and accelerate the...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...
DM
2008
112views more  DM 2008»
15 years 3 months ago
Orbit-counting polynomials for graphs and codes
We construct an "orbital Tutte polynomial" associated with a dual pair M and M of matrices over a principal ideal domain R and a group G of automorphisms of the row spac...
Peter J. Cameron, Bill Jackson, Jason D. Rudd
ICIAR
2010
Springer
15 years 1 months ago
Recognition of Facial Expressions by Cortical Multi-scale Line and Edge Coding
Abstract. Face-to-face communications between humans involve emotions, which often are unconsciously conveyed by facial expressions and body gestures. Intelligent human-machine int...
R. J. R. de Sousa, J. M. F. Rodrigues, J. M. Hans ...
ICTAC
2010
Springer
15 years 1 months ago
A Modality for Safe Resource Sharing and Code Reentrancy
Abstract. The potential of linear logic in facilitating reasoning on resource usage has long been recognized. However, convincing uses of linear types in practical programming are ...
Rui Shi, Dengping Zhu, Hongwei Xi