Sciweavers

498 search results - page 55 / 100
» New Constructions for IPP Codes
Sort
View
EUROPAR
2005
Springer
15 years 7 months ago
Performance Modeling: Understanding the Past and Predicting the Future
We present an overview of current research in performance modeling, focusing on efforts underway in the Performance Evaluation Research Center (PERC). Using some new techniques, w...
David H. Bailey, Allan Snavely
JELIA
2004
Springer
15 years 7 months ago
A System with Template Answer Set Programs
Abstract. Although ASP systems have been extended in many directions, they still miss features which may be helpful towards industrial applications, like capabilities of quickly in...
Francesco Calimeri, Giovambattista Ianni, Giuseppe...
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
ECML
1998
Springer
15 years 6 months ago
Learning to Classify X-Ray Images Using Relational Learning
: Image understanding often requires extensive background knowledge. The problem addressed in this paper is such knowledge can be acquired. We discuss how relational machine learni...
Claude Sammut, Tatjana Zrimec
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 5 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway