Sciweavers

6120 search results - page 88 / 1224
» The Power of Linear Functions
Sort
View
INDOCRYPT
2007
Springer
15 years 11 months ago
Linearization Attacks Against Syndrome Based Hashes
Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
Markku-Juhani Olavi Saarinen
STACS
1999
Springer
15 years 9 months ago
A Logical Characterisation of Linear Time on Nondeterministic Turing Machines
The paper gives a logical characterisation of the class NTIME(n) of problems that can be solved on a nondeterministic Turing machine in linear time. It is shown that a set L of str...
Clemens Lautemann, Nicole Schweikardt, Thomas Schw...
SIAMCOMP
2012
13 years 7 months ago
Tabulation-Based 5-Independent Hashing with Applications to Linear Probing and Second Moment Estimation
Abstract. In the framework of Carter and Wegman, a k-independent hash function maps any k keys independently. It is known that 5independent hashing provides good expected performan...
Mikkel Thorup, Yin Zhang
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
15 years 11 months ago
Boost-buck inverter variable structure control for grid-connected photovoltaic systems
—The present work describes the analysis, modeling and control of a transformerless Boost-Buck power inverter used as a DC-AC power conditioning stage for grid-connected photovol...
Carlos Meza, Domingo Biel, Luis Martinez-Salamero,...
MICCAI
2009
Springer
16 years 6 months ago
Nonparametric Mean Shift Functional Detection in the Functional Space for Task and Resting-state fMRI
In functional Magnetic Resonance Imaging (fMRI) data analysis, normalization of time series is an important and sometimes necessary preprocessing step in many widely used methods. ...
Jian Cheng, Feng Shi, Kun Wang, Ming Song, Jiefeng...