Sciweavers

1628 search results - page 275 / 326
» Compiler Construction Using Scheme
Sort
View
ACISP
2007
Springer
14 years 4 months ago
Hash-and-Sign with Weak Hashing Made Secure
Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Sylvain Pasini, Serge Vaudenay
HPCC
2007
Springer
14 years 4 months ago
On Pancyclicity Properties of OTIS Networks
The OTIS-Network (also referred to as two-level swapped network) is composed of n clones of an n-node original network constituting its clusters. It has received much attention due...
Mohammad R. Hoseinyfarahabady, Hamid Sarbazi-Azad
GMP
2006
IEEE
120views Solid Modeling» more  GMP 2006»
14 years 4 months ago
Spectral Sequencing Based on Graph Distance
The construction of linear mesh layouts has found various applications, such as implicit mesh filtering and mesh streaming, where a variety of layout quality criteria, e.g., span ...
Rong Liu, Hao Zhang 0002, Oliver van Kaick
ISBI
2006
IEEE
14 years 4 months ago
Automated detection of stable fracture points in computed tomography image sequences
Automated detection of stable fracture points in a sequence of Computed Tomography (CT) images is found to be a challenging task. In this paper, an innovative scheme for automatic...
Ananda S. Chowdhury, Suchendra M. Bhandarkar, Gaur...
COLCOM
2005
IEEE
14 years 3 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...