Sciweavers

1255 search results - page 189 / 251
» Search words and geography
Sort
View
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
15 years 7 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
15 years 7 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
SAMT
2009
Springer
135views Multimedia» more  SAMT 2009»
15 years 7 months ago
Exploring Relationships between Annotated Images with the ChainGraph Visualization
Abstract. Understanding relationships and commonalities between digital contents based on metadata is a difficult user task that requires sophisticated presentation forms. In this ...
Steffen Lohmann, Philipp Heim, Lena Tetzlaff, Thom...
116
Voted
SGAI
2009
Springer
15 years 7 months ago
An Interval Type-2 Fuzzy Multiple Echelon Supply Chain Model
Planning resources for a supply chain is a major factor determining its success or failure. In this paper we build on previous work introducing an Interval Type-2 Fuzzy Logic mode...
Simon Miller, Robert John
110
Voted
ICDM
2007
IEEE
129views Data Mining» more  ICDM 2007»
15 years 7 months ago
Semi-supervised Clustering Using Bayesian Regularization
Text clustering is most commonly treated as a fully automated task without user supervision. However, we can improve clustering performance using supervision in the form of pairwi...
Zuobing Xu, Ram Akella, Mike Ching, Renjie Tang