This paper aims to propose an extension of SOMs called an “SOM of SOMs,” or SOM¾ , in which the mapped objects are self-organizing maps themselves. In SOM¾ , each nodal unit ...
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
— This paper describes an experimental modular distributed manipulation system upon which one can implement a variety of control schemes. We have shown elsewhere that when one in...
Todd D. Murphey, Joel W. Burdick, J. Burgess, A. H...
A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables....
Abstract. We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant assuming the hardness of finding nontrivial modular square roots of ver...