Sciweavers

532 search results - page 69 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 10 days ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
KRMED
2008
13 years 10 months ago
Exploiting Fast Classification of SNOMED CT for Query and Integration of Health Data
By constructing local extensions to SNOMED we aim to enrich existing medical and related data stores, simplify the expression of complex queries, and establish a foundation for se...
Michael Lawley
COMSWARE
2007
IEEE
14 years 3 months ago
A Peer-to-Peer Scheme to Discover and Select QoS Enhanced Alternate Paths
— Increasing number of communication softwares are built on distributed architectures based on the Peer-toPeer (P2P) model, such as Skype [1], and PeerCast [2]. This model provid...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
ICIP
2006
IEEE
14 years 10 months ago
Multichannel Sampling of Parametric Signals with a Successive Approximation Property
Recently the sampling theory for certain parametric signals based on rate of innovation has been extended to all sampling kernels that satisfy the Strang-Fix conditions, thus incl...
Julius Kusuma, Vivek K. Goyal
RECOMB
2008
Springer
14 years 9 months ago
Computation of Median Gene Clusters
Whole genome comparison based on gene order has become a popular approach in comparative genomics. An important task in this field is the detection of gene clusters, i.e. sets of g...
Sebastian Böcker, Katharina Jahn, Julia Mixta...