Sciweavers

38 search results - page 6 / 8
» How to Build a Hash Function from Any Collision-Resistant Fu...
Sort
View
138
Voted
SIGGRAPH
1992
ACM
15 years 4 months ago
Generative modeling: a symbolic system for geometric modeling
This paper discusses a new, symbolic approach to geometric modeling called generative modeling. The approach allows specification, rendering, and analysis of a wide variety of sha...
John M. Snyder, James T. Kajiya
ICFP
2008
ACM
16 years 10 days ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...
83
Voted
ECCC
2007
122views more  ECCC 2007»
15 years 10 days ago
Infeasibility of Instance Compression and Succinct PCPs for NP
The OR-SAT problem asks, given Boolean formulae φ1, . . . , φm each of size at most n, whether at least one of the φi’s is satisfiable. We show that there is no reduction fr...
Lance Fortnow, Rahul Santhanam
95
Voted
AAAI
2008
15 years 2 months ago
The PELA Architecture: Integrating Planning and Learning to Improve Execution
Building architectures for autonomous rational behavior requires the integration of several AI components, such as planning, learning and execution monitoring. In most cases, the ...
Sergio Jiménez, Fernando Fernández, ...
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 5 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen