Sciweavers

6120 search results - page 60 / 1224
» The Power of Linear Functions
Sort
View
GECCO
2009
Springer
141views Optimization» more  GECCO 2009»
15 years 4 months ago
Benchmarking sep-CMA-ES on the BBOB-2009 function testbed
A partly time and space linear CMA-ES is benchmarked on the BBOB-2009 noiseless function testbed. This algorithm with a multistart strategy with increasing population size solves ...
Raymond Ros
ASIACRYPT
2009
Springer
15 years 6 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...
XSYM
2005
Springer
107views Database» more  XSYM 2005»
15 years 5 months ago
Checking Functional Dependency Satisfaction in XML
Recently, the issue of functional dependencies in XML (XFDs) have been investigated. In this paper we consider the problem of checking the satisfaction of an XFD in an XML document...
Millist W. Vincent, Jixue Liu
ACMICEC
2003
ACM
152views ECommerce» more  ACMICEC 2003»
15 years 5 months ago
Optimal clearing algorithms for multi-unit single-item and multi-unit combinatorial auctions with demand/supply function bidding
This paper presents new clearing algorithms for multi-unit single-item and multi-unit combinatorial auctions with piecewise linear demand/supply functions. We analyse the complexi...
Viet Dung Dang, Nicholas R. Jennings
INDOCRYPT
2001
Springer
15 years 4 months ago
Cryptographic Functions and Design Criteria for Block Ciphers
Most last-round attacks on iterated block ciphers provide some design criteria for the round function. Here, we focus on the links between the underlying properties. Most notably, ...
Anne Canteaut