Sciweavers

1477 search results - page 245 / 296
» Complexity of (iterated) dominance
Sort
View
FOCS
1999
IEEE
14 years 1 months ago
Limits on the Efficiency of One-Way Permutation-Based Hash Functions
Naor and Yung show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build...
Jeong Han Kim, Daniel R. Simon, Prasad Tetali
SMA
1999
ACM
152views Solid Modeling» more  SMA 1999»
14 years 1 months ago
Fast volume-preserving free form deformation using multi-level optimization
We present an efficient algorithm for preserving the total volume of a solids undergoing free-form deformation using discrete level-of-detail representations. Given the boundary r...
Gentaro Hirota, Renee Maheshwari, Ming C. Lin
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
14 years 1 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
CSCW
1998
ACM
14 years 28 days ago
Just Talk to Me: A Field Study of Expertise Location
Everyday, people in organizations must solve their problems to get their work accomplished. To do so, they often must find others with knowledge and information. Systems that assi...
David W. McDonald, Mark S. Ackerman
LCTRTS
1998
Springer
14 years 28 days ago
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
Abstract. Previously published methods for estimation of the worstcase execution time on contemporary processors with complex pipelines and multi-level memory hierarchies result in...
Thomas Lundqvist, Per Stenström