Sciweavers

4781 search results - page 219 / 957
» Complexity at large
Sort
View
74
Voted
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux
SAG
2004
Springer
15 years 6 months ago
Modelling a Protein Structure Comparison Application on the Grid Using PROTEUS
Bioinformatics applications manage complex biological data stored into distributed and often heterogeneous databases and require large computing power. Among these, protein structu...
Mario Cannataro, Matteo Comin, Carlo Ferrari, Conc...
90
Voted
EUROSEC
2009
ACM
15 years 7 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
ICC
2009
IEEE
145views Communications» more  ICC 2009»
15 years 7 months ago
Rapid Prototyping of Clarkson's Lattice Reduction for MIMO Detection
—This paper presents the field-programmable gate array (FPGA) implementation of a variant of the LenstraLenstra-Lov´asz (LLL) lattice reduction (LR) algorithm, known as the Cla...
Luis G. Barbero, David L. Milliner, Tharmalingam R...
KIVS
2005
Springer
15 years 6 months ago
A Comparison of WS-BusinessActivity and BPEL4WS Long-Running Transaction
Although WS-BusinessActivity and BPEL4WS Long-Running Transaction (LRT) are conceptually very similar and are both designed to support the execution of complex business transaction...
Patrick Sauter, Ingo Melzer