Sciweavers

15792 search results - page 29 / 3159
» Computational Abstraction Steps
Sort
View
ICISC
2007
96views Cryptology» more  ICISC 2007»
13 years 9 months ago
Colliding Message Pair for 53-Step HAS-160
We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 235 hash computations. The attack is based on the work of Cho e...
Florian Mendel, Vincent Rijmen
DC
2008
13 years 8 months ago
Fast computation by population protocols with a leader
Fast algorithms are presented for performing computations in a probabilistic population model. This is a variant of the standard population protocol model--in which finite-state ag...
Dana Angluin, James Aspnes, David Eisenstat
ICPR
2006
IEEE
14 years 9 months ago
Adaptive Step Size Window Matching for Detection
An often overlooked problem in matching lies in selecting an appropriate step size. The selection of the step size for real-time applications is critical both from the point of vi...
Nathan Mekuz, Konstantinos G. Derpanis, John K. Ts...
ICPR
2000
IEEE
14 years 9 months ago
First Steps toward Automatic Location of Landmarks on X-Ray Images
We address the problem of locating some anatomical bone structures on lateral cranial X-Ray Images. These structures are landmarks used in orthodontic therapy. The main problem in...
Barbara Romaniuk, Marie-Josèphe Deshayes, M...
CHI
2006
ACM
14 years 8 months ago
PEDdo: steps to a healthy lifestyle
Studies show that 14-to-40 year olds are spending more time at the computer and less time exercising. Using Contextual Design, our group tackled the challenge of motivating people...
Visda Goudarzi, Stanislav Tomic