Sciweavers

2436 search results - page 170 / 488
» Comonadic Notions of Computation
Sort
View
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 10 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
PERVASIVE
2007
Springer
15 years 10 months ago
Assessing the Suitability of Context Information for Ambient Display
With the advance of pervasive technology, information from both the physical and virtual world is increasingly accessible to developers. Context -aware applications may consume re...
Steve Neely, Graeme Stevenson, Paddy Nixon
IJCNN
2006
IEEE
15 years 10 months ago
Studies on Sparse Array Cortical Modeling and Memory Cognition Duality
— In this paper we have suggested a sparse three dimensional array model for the brain. Entries of the array are synaptic weights as functions of time. This is a typical four dim...
Kausik Kumar Majumdar, Robert Kozma
SP
2006
IEEE
136views Security Privacy» more  SP 2006»
15 years 10 months ago
Simulatable Security and Polynomially Bounded Concurrent Composability
Simulatable security is a security notion for multi-party protocols that implies strong composability features. The main definitional flavours of simulatable security are standa...
Dennis Hofheinz, Dominique Unruh
ITICSE
2006
ACM
15 years 10 months ago
Using patterns in the automatic marking of ER-diagrams
This paper illustrates how the notion of pattern can be used in the automatic analysis and synthesis of diagrams, applied particularly to the automatic marking of ER-diagrams. The...
Pete G. Thomas, Kevin G. Waugh, Neil Smith