Sciweavers

253 search results - page 36 / 51
» Conditional Symmetry Breaking
Sort
View
CORR
2011
Springer
194views Education» more  CORR 2011»
14 years 4 months ago
Polarized Montagovian Semantics for the Lambek-Grishin calculus
Grishin ([10]) proposed enriching the Lambek calculus with multiplicative disjunction (par) and coresiduals. Applications to linguistics were discussed by Moortgat ([15]), who spok...
Arno Bastenhof
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
15 years 10 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
EDBT
2006
ACM
156views Database» more  EDBT 2006»
15 years 9 months ago
Indexing Incomplete Databases
Incomplete databases, that is, databases that are missing data, are present in many research domains. It is important to derive techniques to access these databases efficiently. We...
Guadalupe Canahuate, Michael Gibas, Hakan Ferhatos...
ECBS
2009
IEEE
105views Hardware» more  ECBS 2009»
15 years 4 months ago
A Framework for Developing Feature-Rich Software Systems
In response to changing requirements and other environmental influences, software systems are increasingly developed incrementally. Successful implementation of new features in e...
Thein Than Tun, Rod Chapman, Charles B. Haley, Rob...
81
Voted
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 3 months ago
From Weak to Strong Watermarking
The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark wit...
Nicholas Hopper, David Molnar, David Wagner