Sciweavers

2629 search results - page 162 / 526
» complex 2009
Sort
View
94
Voted
FSE
2009
Springer
106views Cryptology» more  FSE 2009»
16 years 1 months ago
Practical Collisions for EnRUPT
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 competition, organised by NIST [4]. The proposal contains seven concrete has...
Sebastiaan Indesteege, Bart Preneel
104
Voted
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
16 years 1 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
129
Voted
MOBIHOC
2009
ACM
16 years 1 months ago
Demonstration of highly programmable downlink OFDMA (WiMax) transceivers for SDR systems
In this paper, we present the architecture of a highly configurable multi-input multi?output (MIMO) orthogonal frequency division multiple access (OFDMA) platform. The platform is...
Hamid Eslami, Gaurav Patel, Chitaranjan P. Sukumar...
83
Voted
ICDCS
2009
IEEE
15 years 10 months ago
A Commutative Replicated Data Type for Cooperative Editing
A Commutative Replicated Data Type (CRDT) is one where all concurrent operations commute. The replicas of a CRDT converge automatically, without complex concurrency control. This ...
Nuno M. Preguiça, Joan Manuel Marquè...
108
Voted
IUI
2009
ACM
15 years 9 months ago
Multi-touch interaction for robot control
Recent developments in multi-touch technologies have exposed fertile ground for research in enriched humanrobot interaction. Although multi-touch technologies have been used for v...
Mark Micire, Jill L. Drury, Brenden Keyes, Holly A...