Sciweavers

496 search results - page 36 / 100
» Controlled Physical Random Functions
Sort
View
82
Voted
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
107
Voted
CCS
2006
ACM
15 years 4 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
106
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Cross-Layer Error Control Optimization in WiMAX
—WiMAX is one of the most promising emerging broadband wireless technologies. As a consequence, data transfer performance optimization represents a crucial issue due to TCP limit...
Dzmitry Kliazovich, Tommaso Beniero, Sergio Dalsas...
DAC
2006
ACM
15 years 6 months ago
High-performance operating system controlled memory compression
This article describes a new software-based on-line memory compression algorithm for embedded systems and presents a method of adaptively managing the uncompressed and compressed ...
Lei Yang, Haris Lekatsas, Robert P. Dick
94
Voted
SIGGRAPH
1994
ACM
15 years 4 months ago
Hierarchical spacetime control
Specifying the motion of an animated linked figure such that it achieves given tasks (e.g., throwing a ball into a basket) and performs the tasks in a realistic fashion (e.g., gra...
Zicheng Liu, Steven J. Gortler, Michael F. Cohen