Sciweavers

826 search results - page 128 / 166
» Designing for families
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
FSE
2008
Springer
177views Cryptology» more  FSE 2008»
14 years 11 months ago
MD4 is Not One-Way
MD4 is a hash function introduced by Rivest in 1990. It is still used in some contexts, and the most commonly used hash function (MD5, SHA-1, SHA-2) are based on the design princip...
Gaëtan Leurent
CIDR
2007
165views Algorithms» more  CIDR 2007»
14 years 11 months ago
A Black-Box Approach to Query Cardinality Estimation
We present a “black-box” approach to estimating query cardinality that has no knowledge of query execution plans and data distribution, yet provides accurate estimates. It doe...
Tanu Malik, Randal C. Burns, Nitesh V. Chawla
LREC
2008
120views Education» more  LREC 2008»
14 years 11 months ago
The U.S. Policy Agenda Legislation Corpus Volume 1 - a Language Resource from 1947 - 1998
We introduce the corpus of United States Congressional bills from 1947 to 1998 for use by language research communities. The U.S. Policy Agenda Legislation Corpus Volume 1 (USPALC...
Stephen Purpura, John Wilkerson, Dustin Hillard
AIML
2006
14 years 11 months ago
From topology to metric: modal logic and quantification in metric spaces
We propose a framework for comparing the expressive power and computational behaviour of modal logics designed for reasoning about qualitative aspects of metric spaces. Within this...
Mikhail Sheremet, Dmitry Tishkovsky, Frank Wolter,...