At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
: Recently, a method called (PC)2 A was proposed to deal with face recognition with one training image per person. As an extension of the standard eigenface technique, (PC)2 A comb...
The Twenty-One project brings together environmental organisations, technology providers and research institutes from several European countries. The main objective of the project...
Wilco G. ter Stal, J.-H. Beijert, G. de Bruin, J. ...
Set Cover problems are of core importance in many applications. In recent research, the "red-blue variants" where blue elements all need to be covered whereas red elemen...
Michael Dom, Jiong Guo, Rolf Niedermeier, Sebastia...
We consider static one dimensional range searching problems. These problems are to build static data structures for an integer set S U, where U = {0, 1, . . . , 2w - 1}, which su...