We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 235 hash computations. The attack is based on the work of Cho e...
Fast algorithms are presented for performing computations in a probabilistic population model. This is a variant of the standard population protocol model--in which finite-state ag...
An often overlooked problem in matching lies in selecting an appropriate step size. The selection of the step size for real-time applications is critical both from the point of vi...
Nathan Mekuz, Konstantinos G. Derpanis, John K. Ts...
We address the problem of locating some anatomical bone structures on lateral cranial X-Ray Images. These structures are landmarks used in orthodontic therapy. The main problem in...
Studies show that 14-to-40 year olds are spending more time at the computer and less time exercising. Using Contextual Design, our group tackled the challenge of motivating people...