Sciweavers

2119 search results - page 273 / 424
» Structure-Preserving Model Reduction
Sort
View
110
Voted
CRYPTO
2001
Springer
155views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
RSA-OAEP Is Secure under the RSA Assumption
Recently Victor Shoup noted that there is a gap in the widely-believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OA...
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointch...
127
Voted
FCCM
2000
IEEE
133views VLSI» more  FCCM 2000»
15 years 7 months ago
Configuration Caching Management Techniques for Reconfigurable Computing
Although run-time reconfigurable systems have been shown to achieve very high performance, the speedups over traditional microprocessor systems are limited by the cost of configur...
Zhiyuan Li, Katherine Compton, Scott Hauck
133
Voted
HCW
2000
IEEE
15 years 7 months ago
A Heuristic Algorithm for Mapping Communicating Tasks on Heterogeneous Resources
A heuristic algorithm that maps data-processing tasks onto heterogeneous resources (i.e., processors and links of various capacities) is presented. The algorithm tries to achieve ...
Kenjiro Taura, Andrew A. Chien
126
Voted
SIGGRAPH
2000
ACM
15 years 7 months ago
Progressive geometry compression
We propose a new progressive compression scheme for arbitrary topology, highly detailed and densely sampled meshes arising from geometry scanning. We observe that meshes consist o...
Andrei Khodakovsky, Peter Schröder, Wim Sweld...
132
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
A Length-Invariant Hybrid Mix
This paper presents a secure and flexible Mix-net that has the following properties; it efficiently handles long plaintexts that exceed the modulus size of underlying public-key e...
Miyako Ohkubo, Masayuki Abe