Sciweavers

10146 search results - page 1755 / 2030
» Fast FAST
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 8 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
ICWE
2011
Springer
14 years 8 months ago
Reusing Web Application User-Interface Controls
Abstract. Highly interactive web applications that offer user experience and responsiveness of desktop applications are becoming increasingly popular. They are often composed out ...
Josip Maras, Maja Stula, Jan Carlson
INFOCOM
2011
IEEE
14 years 8 months ago
On adaptive-width channel allocation in non-cooperative, multi-radio wireless networks
—Due to the limitation of radio spectrum resource and fast growing of wireless applications, careful channel allocation is highly needed to mitigate the performance degradation o...
Fan Wu, Nikhil Singh, Nitin H. Vaidya, Guihai Chen
INFOCOM
2011
IEEE
14 years 8 months ago
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective
—In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc Networks (MANETs). Specifically, we consider two node mobility models: (1)...
Yun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng
JCAM
2011
78views more  JCAM 2011»
14 years 7 months ago
Symmetric box-splines on root lattices
Root lattices are efficient sampling lattices for reconstructing isotropic signals in arbitrary dimensions, due to their highly symmetric structure. One root lattice, the Cartesia...
Minho Kim, Jörg Peters
« Prev « First page 1755 / 2030 Last » Next »