Sciweavers

2340 search results - page 14 / 468
» Second quarter 2008
Sort
View
EUROCRYPT
2008
Springer
15 years 1 months ago
Second Preimage Attacks on Dithered Hash Functions
Abstract. We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of Dean [8] and Kelsey and Schneier [16] wi...
Elena Andreeva, Charles Bouillaguet, Pierre-Alain ...
APVIS
2008
15 years 1 months ago
Second Order Pre-Integrated Volume Rendering
In the field of Volume Rendering, pre-integration techniques for arbitrary transfer functions has certainly led to the most significant and convincing results both quality and per...
Jean-François El Hajjar, Stephane Marchesin...
SIAMJO
2010
87views more  SIAMJO 2010»
14 years 10 months ago
A Second Derivative SQP Method: Global Convergence
Abstract. Sequential quadratic programming (SQP) methods form a class of highly efficient algorithms for solving nonlinearly constrained optimization problems. Although second deri...
Nicholas I. M. Gould, Daniel P. Robinson
CDC
2008
IEEE
121views Control Systems» more  CDC 2008»
15 years 6 months ago
Stability of a second order consensus algorithm with time delay
—In this paper, we investigate a second order consensus problem in a directed graph with non-uniform time delay. This problem arises naturally in real multi-agent systems such as...
Wen Yang, Andrea L. Bertozzi, Xiaofan Wang
CORR
2008
Springer
104views Education» more  CORR 2008»
14 years 12 months ago
Compatibility of Shelah and Stupp's and Muchnik's iteration with fragments of monadic second order logic
We investigate the relation between the theory of the iterations in the sense of Shelah-Stupp and of Muchnik, resp., and the theory of the base structure for several logics. These ...
Dietrich Kuske