Sciweavers

3134 search results - page 35 / 627
» Computing full disjunctions
Sort
View
ICTAC
2004
Springer
14 years 3 months ago
Object Connectivity and Full Abstraction for a Concurrent Calculus of Classes
onnectivity and Full Abstraction for a Concurrent Calculus of Classes⋆ nded Abstract — Erika ´Abrah´am2 , Marcello M. Bonsangue3 , Frank S. de Boer4 , and Martin Steffen1 1 ...
Erika Ábrahám, Marcello M. Bonsangue...
ISPASS
2007
IEEE
14 years 4 months ago
Accelerating Full-System Simulation through Characterizing and Predicting Operating System Performance
The ongoing trend of increasing computer hardware and software complexity has resulted in the increase in complexity and overheads of cycle-accurate processor system simulation, e...
Seongbeom Kim, Fang Liu, Yan Solihin, Ravi R. Iyer...
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
ASIACRYPT
2010
Springer
13 years 8 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
CVPR
2010
IEEE
1256views Computer Vision» more  CVPR 2010»
14 years 5 months ago
Multisensor-Fusion for 3D Full-Body Human Motion Capture
DATA available at http://www.tnt.uni-hannover.de/project/MPI08_Database/! In this work, we present an approach to fuse video with orientation data obtained from extended iner...
Gerard Pons-Moll, Andreas Baak, Thomas Helten, Mei...