Sciweavers

1982 search results - page 276 / 397
» Parametricity and dependent types
Sort
View
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
DAGM
2007
Springer
15 years 4 months ago
Classifying Glaucoma with Image-Based Features from Fundus Photographs
Glaucoma is one of the most common causes of blindness and it is becoming even more important considering the ageing society. Because healing of died retinal nerve fibers is not p...
Rüdiger Bock, Jörg Meier, Georg Michelso...
ICS
2007
Tsinghua U.
15 years 4 months ago
Tradeoff between data-, instruction-, and thread-level parallelism in stream processors
This paper explores the scalability of the Stream Processor architecture along the instruction-, data-, and thread-level parallelism dimensions. We develop detailed VLSI-cost and ...
Jung Ho Ahn, Mattan Erez, William J. Dally
IWSEC
2007
Springer
15 years 4 months ago
Batch Pairing Delegation
Abstract. Pairing-based cryptography (PBC) has enabled the construction of many cryptographic protocols. However, there are scenarios when PBC is too heavyweight to use, such as wh...
Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smit...
93
Voted
MSN
2007
Springer
125views Sensor Networks» more  MSN 2007»
15 years 4 months ago
Ensuring Area Coverage in Hybrid Wireless Sensor Networks
Success of Wireless Sensor Networks largely depends whether the deployed network can provide desired coverage with acceptable network lifetime. This paper proposes a distributed pr...
Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha