Sciweavers

3145 search results - page 146 / 629
» Algebraic Linear Orderings
Sort
View
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
14 years 8 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir

Publication
289views
14 years 2 months ago
An Analysis of Finite Volume, Finite Element, and Finite Difference Methods Using Some Concepts from Algebraic Topology
In this paper we apply the ideas of algebraic topology to the analysis of the finite volume and finite element methods, illuminating the similarity between the discretization str...
Claudio Mattiussi
TIT
2010
107views Education» more  TIT 2010»
14 years 11 months ago
On the optimum distance profiles about linear block codes
In this paper, for some linear block codes, two kinds of optimum distance profiles (ODPs) are introduced to consider how to construct and then exclude (or include) the basis codewo...
Yuan Luo, A. J. Han Vinck, Yanling Chen
SODA
1990
ACM
49views Algorithms» more  SODA 1990»
15 years 5 months ago
Factor Refinement
Let O be an order of an algebraic number field. It was shown by Ge that given a factorization of an O-ideal a into a product of O-ideals it is possible to compute in polynomial tim...
Eric Bach, James R. Driscoll, Jeffrey Shallit
IPSN
2009
Springer
15 years 11 months ago
Algebraic approach to recovering topological information in distributed camera networks
Camera networks are widely used for tasks such as surveillance, monitoring and tracking. In order to accomplish these tasks, knowledge of localization information such as camera l...
Edgar J. Lobaton, Parvez Ahammad, Shankar Sastry