Sciweavers

922 search results - page 140 / 185
» On a Generalization of the Stone-Weierstrass Theorem
Sort
View
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
15 years 8 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
ISAAC
2007
Springer
158views Algorithms» more  ISAAC 2007»
15 years 8 months ago
On the Expressive Power of Planar Perfect Matching and Permanents of Bounded Treewidth Matrices
Valiant introduced some 25 years ago an algebraic model of computation along with the complexity classes VP and VNP, which can be viewed as analogues of the classical classes P and...
Uffe Flarup, Pascal Koiran, Laurent Lyaudet
CONCUR
2005
Springer
15 years 7 months ago
Concurrent Clustered Programming
d Abstract) Vijay Saraswat1 and Radha Jagadeesan2 1 IBM T.J. Watson Research Lab 2 School of CTI, DePaul University Abstract. We present the concurrency and distribution primitives...
Vijay A. Saraswat, Radha Jagadeesan
PPDP
2005
Springer
15 years 7 months ago
Formal validation of pattern matching code
When addressing the formal validation of generated software, two main alternatives consist either to prove the correctness of compilers or to directly validate the generated code....
Claude Kirchner, Pierre-Etienne Moreau, Antoine Re...
NEUROSCIENCE
2001
Springer
15 years 6 months ago
Locust Olfaction
During odour recognition, excitatory and inhibitory groups of neurons in the second stage of the locust olfactory system, the antennal lobe (AL), fire alternately. There is little...
David C. Sterratt