Sciweavers

1350 search results - page 111 / 270
» Generalized Committed Choice
Sort
View
ASIACRYPT
2000
Springer
15 years 8 months ago
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Alex Biryukov, Adi Shamir
FP
1995
156views Formal Methods» more  FP 1995»
15 years 8 months ago
Type Reconstruction for SCI
We present a type reconstruction algorithm for SCIR 10], a type system for a language with syntactic control of interference. SCIR guarantees that terms of passive type do not cau...
Howard Huang, Uday S. Reddy
WSC
2007
15 years 6 months ago
Teaching simulation to business students summary of 30 years' experience
I summarize my experience from having taught simulation to over 7000 students for over 30 years; to undergraduate, graduate and Ph. D. business students, executives and high schoo...
Ingolf Ståhl
DAS
2008
Springer
15 years 6 months ago
A Document Analysis System for Supporting Electronic Voting Research
As a result of well-publicized security concerns with direct recording electronic (DRE) voting, there is a growing call for systems that employ some form of paper artifact to prov...
Daniel P. Lopresti, George Nagy, Elisa H. Barney S...
132
Voted
EUROS
2008
113views Robotics» more  EUROS 2008»
15 years 6 months ago
Measuring Motion Expressiveness in Wheeled Mobile Robots
This paper addresses the measurement of motion expressiveness in wheeled mobile robots. A neural network based supervised learning strategy is proposed as a method to fuse informat...
João Sequeira