Sciweavers

4340 search results - page 203 / 868
» Formal Methods and Cryptography
Sort
View
ARITH
2001
IEEE
15 years 8 months ago
Leading Zero Anticipation and Detection-A Comparison of Methods
Design of the leading zero anticipator ( L a ) or detector (LZD) is pivotal to the normalization of results for addition and fused multiplication-addition in highperjormance float...
Martin S. Schmookler, Kevin J. Nowka
TKDE
2012
236views Formal Methods» more  TKDE 2012»
13 years 7 months ago
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
— Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations. However, while the majority of algorithms...
Gediminas Adomavicius, YoungOk Kwon
ICSE
2001
IEEE-ACM
15 years 9 months ago
State, Event, Time and Diagram in System Modeling
The design of complex systems requires powerful mechanisms for modeling state, concurrent events, and real-time behavior; as well as for visualising and structuring systems in ord...
Jin Song Dong
CSE
2009
IEEE
15 years 11 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
PKC
2007
Springer
151views Cryptology» more  PKC 2007»
15 years 10 months ago
Cryptanalysis of HFE with Internal Perturbation
Abstract. Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the bas...
Vivien Dubois, Louis Granboulan, Jacques Stern