Sciweavers

4498 search results - page 327 / 900
» How to Invent Functions
Sort
View
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 8 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 8 months ago
Genetic algorithms for positioning and utilizing sensors in synthetically generated landscapes
Positioning multiple sensors for acquisition of a a given environment is one of the fundamental research areas in various fields, such as military scouting, computer vision and ro...
Haluk Topcuoglu, Murat Ermis
ACSC
2001
IEEE
15 years 8 months ago
Efficiency of Data Structures for Detecting Overlaps in Digital Documents
This paper analyses the efficiency of different data structures for detecting overlap in digital documents. Most existing approaches use some hash function to reduce the space req...
Krisztián Monostori, Arkady B. Zaslavsky, H...
ICCAD
1995
IEEE
127views Hardware» more  ICCAD 1995»
15 years 8 months ago
Hybrid decision diagrams
Abstract: Functions that map boolean vectors into the integers are important for the design and veri cation of arithmetic circuits. MTBDDs and BMDs have been proposed for represent...
Edmund M. Clarke, Masahiro Fujita, Xudong Zhao
CIMAGING
2008
104views Hardware» more  CIMAGING 2008»
15 years 6 months ago
MCMC curve sampling and geometric conditional simulation
We present an algorithm to generate samples from probability distributions on the space of curves. Traditional curve evolution methods use gradient descent to find a local minimum...
Ayres C. Fan, John W. Fisher III, Jonathan Kane, A...