Sciweavers

2629 search results - page 80 / 526
» complex 2009
Sort
View
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 1 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
ISSAC
2011
Springer
243views Mathematics» more  ISSAC 2011»
14 years 21 days ago
Practical polynomial factoring in polynomial time
There are several algorithms for factoring in Z[x] which have a proven polynomial complexity bound such as Sch¨onhage of 1984, Belabas/Kl¨uners/van Hoeij/Steel of 2004, and vanH...
William Hart, Mark van Hoeij, Andrew Novocin
ICML
2009
IEEE
15 years 10 months ago
Importance weighted active learning
We propose an importance weighting framework for actively labeling samples. This technique yields practical yet sound active learning algorithms for general loss functions. Experi...
Alina Beygelzimer, Sanjoy Dasgupta, John Langford
IROS
2009
IEEE
169views Robotics» more  IROS 2009»
15 years 4 months ago
Control and navigation of the skiing robot
— The paper describes the control and the navigation of a skiing robot that is capable of autonomous skiing on a ski slope using the carving skiing technique. Based on a complex ...
Bojan Nemec, Leon Lahajnar
CIE
2009
Springer
15 years 4 months ago
On Generating Independent Random Strings
It is shown that from two strings that are partially random and independent (in the sense of Kolmogorov complexity) it is possible to effectively construct polynomially many strin...
Marius Zimand