Sciweavers

882 search results - page 42 / 177
» Visibility-driven transfer functions
Sort
View
ACSC
2005
IEEE
15 years 7 months ago
A High Performance Kernel-Less Operating System Architecture
Operating Systems provide services that are accessed by processes via mechanisms that involve a ring transition to transfer control to the kernel where the required function is pe...
Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 6 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
15 years 7 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche
IJCAI
2007
15 years 2 months ago
General Game Learning Using Knowledge Transfer
We present a reinforcement learning game player that can interact with a General Game Playing system and transfer knowledge learned in one game to expedite learning in many other ...
Bikramjit Banerjee, Peter Stone
AINA
2010
IEEE
15 years 4 months ago
Applying TCP-Friendly Congestion Control to Concurrent Multipath Transfer
Abstract--The steadily growing importance of Internetbased applications and their resilience requirements lead to a rising number of multi-homed sites. The idea of Concurrent Multi...
Thomas Dreibholz, Martin Becke, Jobin Pulinthanath...