Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
The paper gives a logical characterisation of the class NTIME(n) of problems that can be solved on a nondeterministic Turing machine in linear time. It is shown that a set L of str...
Clemens Lautemann, Nicole Schweikardt, Thomas Schw...
Abstract. In the framework of Carter and Wegman, a k-independent hash function maps any k keys independently. It is known that 5independent hashing provides good expected performan...
—The present work describes the analysis, modeling and control of a transformerless Boost-Buck power inverter used as a DC-AC power conditioning stage for grid-connected photovol...
Carlos Meza, Domingo Biel, Luis Martinez-Salamero,...
In functional Magnetic Resonance Imaging (fMRI) data analysis, normalization of time series is an important and sometimes necessary preprocessing step in many widely used methods. ...
Jian Cheng, Feng Shi, Kun Wang, Ming Song, Jiefeng...