Sciweavers

2059 search results - page 279 / 412
» New Advances in Reconfigurable Computing and its Application...
Sort
View
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
15 years 5 months ago
The Second-Preimage Attack on MD4
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicabl...
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
CONEXT
2008
ACM
15 years 1 months ago
Uplink allocation beyond choke/unchoke: or how to divide and conquer best
Motivated by emerging cooperative P2P applications we study new uplink allocation algorithms for substituting the ratebased choke/unchoke algorithm of BitTorrent which was develop...
Nikolaos Laoutaris, Damiano Carra, Pietro Michiard...
CVPR
2009
IEEE
16 years 6 months ago
On Edge Detection on Surfaces
Edge detection in images has been a fundamental problem in computer vision from its early days. Edge detection on surfaces, on the other hand, has received much less attention. ...
Michael Kolomenkin, Ayellet Tal, Ilan Shimshoni
ICSE
2005
IEEE-ACM
15 years 12 months ago
A B.S. degree in informatics: contextualizing software engineering education
Software engineering (SE) is very different in focus from traditional computer science: it is not just about computers and software, but as much about the context in which they ar...
André van der Hoek, David G. Kay, Debra J. ...
IPPS
2008
IEEE
15 years 6 months ago
Performance comparison of SGI Altix 4700 and SGI Altix 3700 Bx2
Suitability of the next generation of high-performance computing systems for petascale simulations will depend on a balance between factors such as processor performance, memory p...
Subhash Saini, Dennis C. Jespersen, Dale Talcott, ...