Sciweavers

15421 search results - page 3080 / 3085
» Dependability
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 4 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
98
Voted
ATAL
2009
Springer
15 years 4 months ago
Caching schemes for DCOP search algorithms
Distributed Constraint Optimization (DCOP) is useful for solving agent-coordination problems. Any-space DCOP search algorithms require only a small amount of memory but can be spe...
William Yeoh, Pradeep Varakantham, Sven Koenig
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 2 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
IPMI
2003
Springer
15 years 2 months ago
CAD Tool for Burn Diagnosis
In this paper, a novel region growing algorithm for segmenting burn wounds in digital photographs of the skin is presented. This segmentation step has been developed as part of a C...
Begoña Acha, Carmen Serrano, José I....
SWAT
1998
Springer
110views Algorithms» more  SWAT 1998»
15 years 1 months ago
On the Number of Regular Vertices of the Union of Jordan Regions
Let C be a collection of n Jordan regions in the plane in general position, such that each pair of their boundaries intersect in at most s points, where s is a constant. Let U den...
Boris Aronov, Alon Efrat, Dan Halperin, Micha Shar...
« Prev « First page 3080 / 3085 Last » Next »