Sciweavers

3602 search results - page 208 / 721
» Isn't It About Time
Sort
View
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
14 years 4 months ago
Preimage and Collision Attacks on MD2
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The ...
Lars R. Knudsen, John Erik Mathiassen
ICLP
2005
Springer
14 years 4 months ago
Nondeterminism Analysis of Functional Logic Programs
Abstract. Information about the nondeterminism behavior of a functional logic program is important for various reasons. For instance, a nondeterministic choice in I/O operations re...
Bernd Braßel, Michael Hanus
SEMWEB
2005
Springer
14 years 4 months ago
The Personal Publication Reader
This application demonstrates how to provide personalized, syndicated views on distributed web data using Semantic Web technologies. The application comprises four steps: The infor...
Fabian Abel, Robert Baumgartner, Adrian Brooks, Ch...
WDAG
2005
Springer
90views Algorithms» more  WDAG 2005»
14 years 4 months ago
Proving Atomicity: An Assertional Approach
Atomicity (or linearizability) is a commonly used consistency criterion for distributed services and objects. Although atomic object implementations are abundant, proving that algo...
Gregory Chockler, Nancy A. Lynch, Sayan Mitra, Jos...
ARGMAS
2004
Springer
14 years 4 months ago
An Argument-Based Framework to Model an Agent's Beliefs in a Dynamic Environment
Abstract. One of the most difficult problems in multiagent systems involves representing knowledge and beliefs of agents in dynamic environments. New perceptions modify an agent’...
Marcela Capobianco, Carlos Iván Chesñ...