Sciweavers

1566 search results - page 274 / 314
» Contification Using Dominators
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers
Recently proposed algebraic attacks [2, 6] and fast algebraic attacks [1, 5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exp...
Philip Hawkes, Gregory G. Rose
ER
2004
Springer
179views Database» more  ER 2004»
15 years 3 months ago
XSLTGen: A System for Automatically Generating XML Transformations via Semantic Mappings
Abstract. XML is rapidly emerging as a dominant standard for representing and exchanging information. The ability to transform and present data in XML is crucial and XSLT is a rela...
Stella Waworuntu, James Bailey
ISMIR
2004
Springer
192views Music» more  ISMIR 2004»
15 years 3 months ago
Extraction of Drum Patterns and their Description within the MPEG-7 High-Level-Framework
A number of metadata standards have been published in recent years due to the increasing availability of multimedia content and the resulting issue of sorting and retrieving this ...
Matthias Gruhne, Christian Uhle, Christian Dittmar...
ISPA
2004
Springer
15 years 3 months ago
An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks
Abstract. In mobile ad hoc networks (MANETs), networks can be partitioned into clusters. Clustering algorithms are localized algorithms that have the property of creating an upper ...
Wei Lou, Jie Wu
LCPC
2004
Springer
15 years 3 months ago
Branch Strategies to Optimize Decision Trees for Wide-Issue Architectures
Abstract. Branch predictors are associated with critical design issues for nowadays instruction greedy processors. We study two important domains where the optimization of decision...
Patrick Carribault, Christophe Lemuet, Jean-Thomas...