Sciweavers

1763 search results - page 193 / 353
» Dependent random choice
Sort
View
SIGGRAPH
1995
ACM
13 years 11 months ago
Feature-based control of visibility error: a multi-resolution clustering algorithm for global illumination
In this paper we introduce a new approach to controlling error in hierarchical clustering algorithms for radiosity. The new method ensures that just enough work is done to meet th...
François X. Sillion, George Drettakis
ISARCS
2010
156views Hardware» more  ISARCS 2010»
13 years 10 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký
DSN
2005
IEEE
13 years 10 months ago
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network
This paper describes an experiment performed on Wide Area Network to assess and fairly compare the Quality of Service provided by a large family of failure detectors. Failure dete...
Lorenzo Falai, Andrea Bondavalli
EUROCRYPT
2008
Springer
13 years 10 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 9 months ago
Cryptanalysis of LASH
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7) ....
Ron Steinfeld, Scott Contini, Krystian Matusiewicz...