Sciweavers

7921 search results - page 65 / 1585
» LSH-preserving functions and their applications
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Using genetic algorithms to generate test plans for functionality testing
Like in other fields, computer products (applications, hardware, etc.), before being marketed, require some level of testing to verify whether they meet their design and function...
Francisca Emanuelle Vieira, Francisco Martins, Raf...
MM
2005
ACM
134views Multimedia» more  MM 2005»
14 years 3 months ago
Formulating context-dependent similarity functions
Tasks of information retrieval depend on a good distance function for measuring similarity between data instances. The most effective distance function must be formulated in a con...
Gang Wu, Edward Y. Chang, Navneet Panda
EUROCRYPT
2005
Springer
14 years 3 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
ICML
2005
IEEE
14 years 10 months ago
Generalized skewing for functions with continuous and nominal attributes
This paper extends previous work on skewing, an approach to problematic functions in decision tree induction. The previous algorithms were applicable only to functions of binary v...
Soumya Ray, David Page
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 3 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak