Sciweavers

5722 search results - page 473 / 1145
» Security Function Interactions
Sort
View
JSCIC
2008
82views more  JSCIC 2008»
15 years 4 months ago
Mathematical and Numerical Aspects of a Phase-field Approach to Critical Nuclei Morphology in Solids
Abstract We investigate a phase-field model for homogeneous nucleation and critical nucleus morphology in solids. We analyze the mathematical properties of a free energy functional...
Lei Zhang, Long-Qing Chen, Qiang Du
JSYML
2006
62views more  JSYML 2006»
15 years 4 months ago
Uniform almost everywhere domination
Abstract. We explore the interaction between Lebesgue measure and dominating functions. We show, via both a priority construction and a forcing construction, that there is a functi...
Peter Cholak, Noam Greenberg, Joseph S. Miller
ACL
2011
14 years 8 months ago
Word Alignment via Submodular Maximization over Matroids
We cast the word alignment problem as maximizing a submodular function under matroid constraints. Our framework is able to express complex interactions between alignment component...
Hui Lin, Jeff Bilmes
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
15 years 9 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
SIGOPS
1998
123views more  SIGOPS 1998»
15 years 4 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...