Sciweavers

902 search results - page 60 / 181
» R* Search
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 6 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
WEA
2004
Springer
150views Algorithms» more  WEA 2004»
15 years 5 months ago
Increased Bit-Parallelism for Approximate String Matching
Abstract. Bit-parallelism permits executing several operations simultaneously over a set of bits or numbers stored in a single computer word. This technique permits searching for t...
Heikki Hyyrö, Kimmo Fredriksson, Gonzalo Nava...
COMAD
2008
15 years 1 months ago
Query Heartbeat: A Strange Property of Keyword Queries on the Web
This paper illustrates a strange property that was encountered when analysing keyword query data. The objective of this work was to observe the temporal properties of keyword quer...
R. Karthik, Aditya Ramana Rachakonda, Srinath Srin...
MICRO
2003
IEEE
96views Hardware» more  MICRO 2003»
15 years 5 months ago
Scalable Hardware Memory Disambiguation for High ILP Processors
This paper describes several methods for improving the scalability of memory disambiguation hardware for future high ILP processors. As the number of in-flight instructions grows...
Simha Sethumadhavan, Rajagopalan Desikan, Doug Bur...
CEC
2010
IEEE
15 years 29 days ago
Beyond No Free Lunch: Realistic algorithms for arbitrary problem classes
In this paper we present a simple and general new No Free Lunch-like result that applies to revisiting algorithms searching arbitrary problem sets. We begin by unifying the assumpt...
James A. R. Marshall, Thomas G. Hinton