Sciweavers

2913 search results - page 369 / 583
» How Much to Copy
Sort
View
129
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...
109
Voted
CIKM
2009
Springer
15 years 10 months ago
User-induced links in collaborative tagging systems
Collaborative tagging systems allow users to use tags to describe their favourite online documents. Two documents that are maintained in the collection of the same user and/or ass...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...
106
Voted
MKM
2009
Springer
15 years 10 months ago
A Logically Saturated Extension of
This paper presents a proof language based on the work of Sacerdoti Coen [1,2], Kirchner [3] and Autexier [4] on ¯λµ˜µ, a calculus introduced by Curien and Herbelin [5,6]. Jus...
Lionel Elie Mamane, Herman Geuvers, James McKinna
PDCAT
2009
Springer
15 years 10 months ago
A Speculative Technique for Auto-Memoization Processor with Multithreading
—We have proposed an auto-memoization processor. This processor automatically and dynamically memoizes both functions and loop iterations, and skips their execution by reusing th...
Yushi Kamiya, Tomoaki Tsumura, Hiroshi Matsuo, Yas...
QUACON
2009
Springer
15 years 10 months ago
A Context Quality Model to Support Transparent Reasoning with Uncertain Context
Much research on context quality in context-aware systems divides into two strands: (1) the qualitative identication of quality measures and (2) the use of uncertain reasoning tec...
Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobso...