Sciweavers

4000 search results - page 205 / 800
» Simulation down under
Sort
View
106
Voted
CPHYSICS
2007
85views more  CPHYSICS 2007»
15 years 3 months ago
The essential role of visualization for modeling nanotubes and nanodiamond
Visualization techniques to help understand the structure of carbon and its allotropes have been developed and applied to atomistic simulation projects which model different carb...
Joan Adler, J. Fox, R. Kalish, T. Mutat, A. Sorkin...
143
Voted
MST
2010
117views more  MST 2010»
14 years 10 months ago
The 1-Versus-2 Queries Problem Revisited
The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2...
Rahul Tripathi
CANS
2011
Springer
254views Cryptology» more  CANS 2011»
14 years 3 months ago
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
Abstract. In this paper we analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving we are able to break 8 rounds of PRINTCip...
Stanislav Bulygin, Johannes Buchmann
CRYPTO
2012
Springer
247views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Black-Box Constructions of Composable Protocols without Set-Up
Abstract. We present the first black-box construction of a secure multiparty computation protocol that satisfies a meaningful notion of concurrent security in the plain model (wi...
Huijia Lin, Rafael Pass
TIT
2010
125views Education» more  TIT 2010»
14 years 10 months ago
Target detection via network filtering
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...
Shu Yang, Eric D. Kolaczyk