Sciweavers

15792 search results - page 29 / 3159
» Computational Abstraction Steps
Sort
View
ICISC
2007
96views Cryptology» more  ICISC 2007»
15 years 1 months ago
Colliding Message Pair for 53-Step HAS-160
We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 235 hash computations. The attack is based on the work of Cho e...
Florian Mendel, Vincent Rijmen
DC
2008
14 years 12 months ago
Fast computation by population protocols with a leader
Fast algorithms are presented for performing computations in a probabilistic population model. This is a variant of the standard population protocol model--in which finite-state ag...
Dana Angluin, James Aspnes, David Eisenstat
ICPR
2006
IEEE
16 years 27 days ago
Adaptive Step Size Window Matching for Detection
An often overlooked problem in matching lies in selecting an appropriate step size. The selection of the step size for real-time applications is critical both from the point of vi...
Nathan Mekuz, Konstantinos G. Derpanis, John K. Ts...
57
Voted
ICPR
2000
IEEE
16 years 26 days ago
First Steps toward Automatic Location of Landmarks on X-Ray Images
We address the problem of locating some anatomical bone structures on lateral cranial X-Ray Images. These structures are landmarks used in orthodontic therapy. The main problem in...
Barbara Romaniuk, Marie-Josèphe Deshayes, M...
CHI
2006
ACM
16 years 5 days ago
PEDdo: steps to a healthy lifestyle
Studies show that 14-to-40 year olds are spending more time at the computer and less time exercising. Using Contextual Design, our group tackled the challenge of motivating people...
Visda Goudarzi, Stanislav Tomic