Sciweavers

2652 search results - page 172 / 531
» Path Differentials and Applications
Sort
View
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
15 years 6 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...
BMCBI
2010
125views more  BMCBI 2010»
15 years 1 hour ago
ProbFAST: Probabilistic Functional Analysis System Tool
Background: The post-genomic era has brought new challenges regarding the understanding of the organization and function of the human genome. Many of these challenges are centered...
Israel T. da Silva, Ricardo Z. N. Vêncio, Th...
147
Voted
NOSSDAV
2001
Springer
15 years 9 months ago
Network support for mobile multimedia using a self-adaptive distributed proxy
Recent advancements in video and audio codec technologies (e.g., RealVideo [18]) make multimedia streaming possible across a wide range of network conditions. With an increasing t...
Zhuoqing Morley Mao, Hoi-sheung Wilson So, Byungho...
GIS
2007
ACM
16 years 6 months ago
Smugglers and border guards: the GeoStar project at RPI
We present the GeoStar project at RPI, which researches various terrain (i.e., elevation) representations and operations thereon. This work is motivated by the large amounts of hi...
W. Randolph Franklin, Metin Inanc, Zhongyi Xie, Da...
IEEEARES
2008
IEEE
15 years 11 months ago
How to Open a File and Not Get Hacked
Careless attention to opening files, often caused by problems with path traversal or shared directories, can expose applications to attacks on the file names that they use. In t...
James A. Kupsch, Barton P. Miller