Sciweavers

762 search results - page 41 / 153
» Conditionally correct superoptimization
Sort
View
JCST
2007
97views more  JCST 2007»
13 years 10 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
HAPTICS
2007
IEEE
14 years 4 months ago
Evaluation of Human Performance with Kinematic and Haptic Errors
In teleoperation systems, link flexion results in kinematic errors, such that the position mapping between the master motion and slave motion is not correct. For haptic feedback ...
Tomonori Yamamoto, Allison M. Okamura
SDB
1995
95views Database» more  SDB 1995»
14 years 1 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
CORR
1998
Springer
82views Education» more  CORR 1998»
13 years 9 months ago
Tractability of Theory Patching
In this paper we consider the problem of theory patching, in which we are given a domain theory, some of whose components are indicated to be possibly awed, and a set of labeled t...
Shlomo Argamon-Engelson, Moshe Koppel
JVCA
1998
90views more  JVCA 1998»
13 years 9 months ago
Interactive rigid body manipulation with obstacle contacts
The interactive manipulation of rigid objects in virtual reality environments requires an object behaviour which is at least physically plausible to be useful for applications lik...
Matthias Buck, Elmar Schömer