Sciweavers

4702 search results - page 5 / 941
» How to Copyright a Function
Sort
View
EUROCRYPT
2005
Springer
14 years 3 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
CORR
2006
Springer
118views Education» more  CORR 2006»
13 years 9 months ago
Integration and mining of malaria molecular, functional and pharmacological data: how far are we from a chemogenomic knowledge s
The organization and mining of malaria genomic and post-genomic data is important to significantly increase the knowledge of the biology of its causative agents, and is motivated,...
L.-M. Birkholtz, Olivier Bastien, G. Wells, D. Gra...
ICFP
2007
ACM
14 years 9 months ago
Functional pearl: the great escape or, how to jump the border without getting caught
Filinski showed that callcc and a single mutable reference cell are sufficient to express the delimited control operators shift and reset. However, this implementation interacts p...
David Herman
BLISS
2008
IEEE
14 years 4 months ago
Effecting an Improvement to the Fitness Function. How to Evolve a More Identifiable Face
Constructing the face of a criminal from the selection of individual facial parts is a hard task. We have been working on a new system called EvoFIT that involves the selection an...
Charlie D. Frowd, Joanne Park, Alex H. McIntyre, V...