Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
This paper is an extended version of a paper that appeared in the proceedings of the IEEE Real-Time Systems Symposium 2009. This paper has been updated with respect to advances ma...
The promise of component-based software development is that larger, more complex systems can be built reasonably quickly and reliably from pre-fabricated ("off-the-shelf"...
We investigate three parameterized algorithmic schemes for graphical models that can accommodate trade-offs between time and space: 1) AND/OR Adaptive Caching (AOC(i)); 2) Variabl...
A line detection and segmentation technique is presented. The proposed technique is an improved version of an older technique. The experiments have been performed on the dataset o...