Sciweavers

4870 search results - page 48 / 974
» Construction of Wavelets and Applications
Sort
View
74
Voted
CRYPTO
2004
Springer
79views Cryptology» more  CRYPTO 2004»
15 years 6 months ago
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Abstract. In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r-tuples of messages that all hash to the...
Antoine Joux
IRAL
2000
ACM
15 years 5 months ago
Construction of a Chinese-English WordNet and its application to CLIR
This paper integrates five linguistic resources, including Cilin, a Chinese-English dictionary, ASBC corpus, SemCor, and WordNet, to construct a Chinese-English WordNet. The resul...
Hsin-Hsi Chen, Chi-Ching Lin, Wen-Cheng Lin
105
Voted
SCAM
2006
IEEE
15 years 6 months ago
Constructing Accurate Application Call Graphs For Java To Model Library Callbacks
Call graphs are widely used to represent calling relationships among methods. However, there is not much interest in calling relationships among library methods in many software e...
Weilei Zhang, Barbara G. Ryder
89
Voted
WEBNET
2000
15 years 2 months ago
Adapting the Web Development Environment for accessible and usable application construction
: Web application accessibility requires the enforcement of a set of rules on the content written or generated with the help of Web Development Environments. W3C Consortium's ...
Elena García Barriocanal, Miguel Áng...
ASIACRYPT
2000
Springer
15 years 5 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...