Sciweavers

1086 search results - page 182 / 218
» Jug measuring: Algorithms and complexity
Sort
View
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
14 years 11 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
BIOCOMP
2007
14 years 11 months ago
Quality-Based Similarity Search for Biological Sequence Databases
Low-Complexity Regions (LCRs) of biological sequences are the main source of false positives in similarity searches for biological sequence databases. We consider the problem of ï...
Xuehui Li, Tamer Kahveci
79
Voted
DAGSTUHL
2006
14 years 11 months ago
Using fast matrix multiplication to solve structured linear systems
Structured linear algebra techniques enable one to deal at once with various types of matrices, with features such as Toeplitz-, Hankel-, Vandermonde- or Cauchy-likeness. Following...
Éric Schost, Alin Bostan, Claude-Pierre Jea...
EUSFLAT
2001
127views Fuzzy Logic» more  EUSFLAT 2001»
14 years 11 months ago
Soft computing in investment appraisal
Standard financial techniques neglect extreme situations and regards large market shifts as too unlikely to matter. Such approach accounts for what occurs most of the time in the ...
Antoaneta Serguieva, John Hunter, Tatiana Kalganov...
CCGRID
2010
IEEE
14 years 10 months ago
High Performance Dimension Reduction and Visualization for Large High-Dimensional Data Analysis
Abstract--Large high dimension datasets are of growing importance in many fields and it is important to be able to visualize them for understanding the results of data mining appro...
Jong Youl Choi, Seung-Hee Bae, Xiaohong Qiu, Geoff...