Sciweavers

4581 search results - page 5 / 917
» Computing Transformation Semigroups
Sort
View
CSR
2008
Springer
13 years 9 months ago
Cryptanalysis of Stickel's Key Exchange Scheme
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (t...
Vladimir Shpilrain
ICDCS
2012
IEEE
11 years 9 months ago
eTransform: Transforming Enterprise Data Centers by Automated Consolidation
Abstract—Modern day enterprises have a large IT infrastructure comprising thousands of applications running on servers housed in tens of data centers geographically spread out. T...
Rahul Singh, Prashant J. Shenoy, K. K. Ramakrishna...
SCALESPACE
2007
Springer
14 years 1 months ago
Spatio-temporal Scale-Spaces
Abstract. A family of spatio-temporal scale-spaces suitable for a moving observer is developed. The scale-spaces are required to be time causal for being usable for real time measu...
Daniel Fagerström
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 7 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata
AI
2008
Springer
13 years 7 months ago
Semiring induced valuation algebras: Exact and approximate local computation algorithms
Local computation in join trees or acyclic hypertrees has been shown to be linked to a particular algebraic structure, called valuation algebra. There are many models of this alge...
Jürg Kohlas, Nic Wilson