Sciweavers

380 search results - page 29 / 76
» The End of Science Revisited
Sort
View
IACR
2011
139views more  IACR 2011»
13 years 9 months ago
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
We revisit meet-in-the-middle attacks on block ciphers and recent developments in meet-in-the-middle preimage attacks on hash functions. Despite the presence of a secret key in the...
Lei Wei, Christian Rechberger, Jian Guo 0001, Hong...
IV
2006
IEEE
111views Visualization» more  IV 2006»
15 years 3 months ago
Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files
This paper presents a novel approach (1) to define, analyze, and map a scientific discipline and (2) to compare and map the expertise of single authors based on personal bibliogra...
Colin Murray, Weimao Ke, Katy Börner
ACMSE
2006
ACM
15 years 3 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
SCCC
2000
IEEE
15 years 2 months ago
A Genetic Classifier Tool
Knowledge discovery is the most desirable end product of an enterprise information system. Researches from different areas recognize that a new generation of intelligent tools for...
Aurora T. R. Pozo, Mozart Hasse

Tutorial
2720views
16 years 9 months ago
Hashing Tutorial
This tutorial does more than simply explain hashing and collision resolution. It lets you try out hash functions and collision resolution methods for yourself so that you can reall...
Cliff Shaffer