Sciweavers

6274 search results - page 1050 / 1255
» From query complexity to computational complexity
Sort
View
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 6 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
DAGSTUHL
2010
15 years 6 months ago
Tracking Lines in Higher Order Tensor Fields
While tensors occur in many areas of science and engineering, little has been done to visualize tensors with order higher than two. Tensors of higher orders can be used for exampl...
Mario Hlawitschka, Gerik Scheuermann
HVEI
2010
15 years 6 months ago
Tangible display systems: direct interfaces for computer-based studies of surface appearance
When evaluating the surface appearance of real objects, observers engage in complex behaviors involving active manipulation and dynamic viewpoint changes that allow them to observ...
Benjamin A. Darling, James A. Ferwerda
LREC
2010
203views Education» more  LREC 2010»
15 years 6 months ago
MPC: A Multi-Party Chat Corpus for Modeling Social Phenomena in Discourse
In this paper, we describe our experience with collecting and creating an annotated corpus of multi-party online conversations in a chat-room environment. This effort is part of a...
Samira Shaikh, Tomek Strzalkowski, Aaron Broadwell...
FORTE
2007
15 years 6 months ago
The DHCP Failover Protocol: A Formal Perspective
Abstract. We present a formal specification and analysis of a faulttolerant DHCP algorithm, used to automatically configure certain host parameters in an IP network. Our algorith...
Rui Fan, Ralph E. Droms, Nancy D. Griffeth, Nancy ...
« Prev « First page 1050 / 1255 Last » Next »