Sciweavers

11168 search results - page 2143 / 2234
» Abstract State Processes
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
14 years 3 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
NAR
2007
121views more  NAR 2007»
13 years 8 months ago
WormBase: new content and better access
WormBase (http://wormbase.org), a model organism database for Caenorhabditis elegans and other related nematodes, continues to evolve and expand. Over the past year WormBase has a...
Tamberlyn Bieri, Darin Blasiar, Philip Ozersky, Ig...
MOBISYS
2011
ACM
12 years 11 months ago
Exploiting FM radio data system for adaptive clock calibration in sensor networks
Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message pa...
Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, R...
BMCBI
2010
123views more  BMCBI 2010»
13 years 9 months ago
eGIFT: Mining Gene Information from the Literature
Background: With the biomedical literature continually expanding, searching PubMed for information about specific genes becomes increasingly difficult. Not only can thousands of r...
Catalina O. Tudor, Carl J. Schmidt, K. Vijay-Shank...
TRECVID
2007
13 years 10 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
« Prev « First page 2143 / 2234 Last » Next »