Sciweavers

1136 search results - page 139 / 228
» Finding Small Holes
Sort
View
DNA
2008
Springer
149views Bioinformatics» more  DNA 2008»
13 years 10 months ago
Connecting the Dots: Molecular Machinery for Distributed Robotics
Abstract. Nature is considered one promising area to search for inspiration in designing robotic systems. Some work in swarm robotics has tried to build systems that resemble distr...
Yuriy Brun, Dustin Reishus
IITA
2007
13 years 10 months ago
An Ergonomics Study of Menu-Operation on Mobile Phone Interface
: The studies on user and mobile phone interaction have been an important problem in small screen interface design. The present study was intend to investigate the impact of three ...
Xuemin Zhang, Wen Shan, Qin Xu, Bin Yang, Yun-Feng...
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
13 years 10 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 10 months ago
Cryptanalysis of LASH
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7) ....
Ron Steinfeld, Scott Contini, Krystian Matusiewicz...
AAAI
2010
13 years 10 months ago
SixthSense: Fast and Reliable Recognition of Dead Ends in MDPs
The results of the latest International Probabilistic Planning Competition (IPPC-2008) indicate that the presence of dead ends, states with no trajectory to the goal, makes MDPs h...
Andrey Kolobov, Mausam, Daniel S. Weld