Sciweavers

7921 search results - page 122 / 1585
» LSH-preserving functions and their applications
Sort
View
JSAI
2005
Springer
15 years 3 months ago
Towards Ontologies of Functionality and Semantic Annotation for Technical Knowledge Management
Abstract. This research aims at promoting sharing of knowledge about functionality of artifacts among engineers, which tends to be implicit in practice. In order to provide a conce...
Yoshinobu Kitamura, Naoya Washio, Yusuke Koji, Rii...
FPL
2004
Springer
103views Hardware» more  FPL 2004»
15 years 3 months ago
Automating Optimized Table-with-Polynomial Function Evaluation for FPGAs
Abstract. Function evaluation is at the core of many compute-intensive applications which perform well on reconfigurable platforms. Yet, in order to implement function evaluation ...
Dong-U Lee, Oskar Mencer, David J. Pearce, Wayne L...
VISUALIZATION
1998
IEEE
15 years 2 months ago
Image-based transfer function design for data exploration in volume visualization
Transfer function design is an integrated component in volume visualization and data exploration. The common trial-and-error approach for transfer function searching is a very dif...
Shiaofen Fang, Tom Biddlecome, Mihran Tuceryan
CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
15 years 2 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
AFRICACRYPT
2008
Springer
14 years 12 months ago
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Abstract. In the context of iterated hash functions, "dithering" designates the technique of adding an iteration-dependent input to the compression function in order to d...
Jean-Philippe Aumasson, Raphael C.-W. Phan