Sciweavers

11016 search results - page 2169 / 2204
» Cloud Computing for Science
Sort
View
125
Voted
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
15 years 4 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
143
Voted
DALT
2008
Springer
15 years 4 months ago
Abstracting and Verifying Strategy-Proofness for Auction Mechanisms
ing and Verifying Strategy-proofness for Auction Mechanisms E. M. Tadjouddine, F. Guerin, and W. Vasconcelos Department of Computing Science, King's College, University of Abe...
Emmanuel M. Tadjouddine, Frank Guerin, Wamberto We...
114
Voted
ELPUB
2008
ACM
15 years 4 months ago
Open Access Citation Rates and Developing Countries
Academics, having written their peer reviewed articles, may at some stage in the make their work Open Access (OA). They can do this by self-archiving an electronic version of thei...
Michael Norris, Charles Oppenheim, Fytton Rowland
128
Voted
ESA
2008
Springer
148views Algorithms» more  ESA 2008»
15 years 4 months ago
Selfish Bin Packing
Following recent interest in the study of computer science problems in a game theoretic setting, we consider the well known bin packing problem where the items are controlled by se...
Leah Epstein, Elena Kleiman
125
Voted
DAGSTUHL
2010
15 years 4 months ago
Patient-Specific Mappings between Myocardial and Coronary Anatomy
The segmentation of the myocardium based on the 17-segment model as recommended by the American Heart Association is widely used in medical practice. The patient-specific coronary...
Maurice Termeer, Javier Oliván Bescó...
« Prev « First page 2169 / 2204 Last » Next »