Sciweavers

3652 search results - page 417 / 731
» A study of query length
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 10 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
FOCS
2003
IEEE
15 years 9 months ago
Always Good Turing: Asymptotically Optimal Probability Estimation
While deciphering the Enigma Code during World War II, I.J. Good and A.M. Turing considered the problem of estimating a probability distribution from a sample of data. They derive...
Alon Orlitsky, Narayana P. Santhanam, Junan Zhang
ISCA
2003
IEEE
114views Hardware» more  ISCA 2003»
15 years 9 months ago
Building Quantum Wires: The Long and the Short of It
As quantum computing moves closer to reality the need for basic architectural studies becomes more pressing. Quantum wires, which transport quantum data, will be a fundamental com...
Mark Oskin, Frederic T. Chong, Isaac L. Chuang, Jo...
IMC
2003
ACM
15 years 9 months ago
On the correlation between route dynamics and routing loops
Routing loops are caused by inconsistencies in the routing state of the network. Although undesirable from this aspect, they can provide insight into the routing dynamics that cau...
Ashwin Sridharan, Sue B. Moon, Christophe Diot
NETGAMES
2003
ACM
15 years 9 months ago
Modeling player session times of on-line games
One of the most important aspects in determining the global traffic characteristics of on-line games is to model the traffic behavior of the client. While modeling the client ON-O...
Francis Chang, Wu-chang Feng