Sciweavers

490 search results - page 26 / 98
» Equivalent Keys of HPC
Sort
View
CONCURRENCY
1998
119views more  CONCURRENCY 1998»
13 years 8 months ago
C to Java: Converting Pointers into References
We consider the problem of converting C pointers to the less flexible concept of references. Our main application is converting scientific applications from C to Java. We provid...
Erik D. Demaine
LICS
2010
IEEE
13 years 6 months ago
A Sound and Complete Calculus for Finite Stream Circuits
Stream circuits are a convenient graphical way to represent streams (or stream functions) computed by finite dimensional linear systems. We present a sound and complete expression...
Stefan Milius
CORR
2012
Springer
185views Education» more  CORR 2012»
12 years 4 months ago
Adjustment Criteria in Causal Diagrams: An Algorithmic Perspective
Identifying and controlling bias is a key problem in empirical sciences. Causal diagram theory provides graphical criteria for deciding whether and how causal effects can be iden...
Johannes Textor, Maciej Liskiewicz
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 9 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
13 years 8 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio