Sciweavers

2340 search results - page 60 / 468
» Second quarter 2008
Sort
View
FSE
2008
Springer
117views Cryptology» more  FSE 2008»
15 years 1 months ago
Efficient Reconstruction of RC4 Keys from Internal States
Abstract. In this paper we present an efficient algorithm for the retrieval of the RC4 secret key, given an internal state. This algorithm is several orders of magnitude faster tha...
Eli Biham, Yaniv Carmeli
HICSS
2008
IEEE
142views Biometrics» more  HICSS 2008»
14 years 12 months ago
K-Trunk and Efficient Algorithms for Finding a K-Trunk on a Tree Network
Given an edge-weighted tree T, a k-trunk is a subtree Tk with k leaves in T which minimizes the sum of the distances of all vertices in T from Tk plus the weight of Tk. In this pa...
Yamin Li, Shietung Peng, Wanming Chu
CCE
2008
14 years 12 months ago
Optimal delivery of chemotherapeutic agents in cancer
In this paper, derivation of the optimal chemotherapy schedule is formulated and solved as a dynamic optimization problem. For this purpose two models representing the tumour grow...
Pinky Dua, Vivek Dua, Efstratios N. Pistikopoulos
CORR
2008
Springer
86views Education» more  CORR 2008»
14 years 12 months ago
Twenty-Five Moves Suffice for Rubik's Cube
How many moves does it take to solve Rubik's Cube? Positions are known that require 20 moves, and it has already been shown that there are no positions that require 27 or mor...
Tomas Rokicki
CORR
2008
Springer
96views Education» more  CORR 2008»
14 years 12 months ago
Cardinality heterogeneities in Web service composition: Issues and solutions
Abstract. Data exchanges between Web services engaged in a composition raise several heterogeneities. In this paper, we address the problem of data cardinality heterogeneity in a c...
Michael Mrissa, Philippe Thiran, Jean-Marie Jacque...