Sciweavers

325 search results - page 34 / 65
» Looking for control
Sort
View
IJACT
2008
101views more  IJACT 2008»
13 years 7 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
KES
2008
Springer
13 years 7 months ago
Information Coordination Using Meta-agents in Information Logistics Processes
In order to coordinate and deliver information in the right time and to the right place, theories from multi-agent systems and information logistics are combined. We use agents to ...
Mats Apelkrans, Anne Håkansson
JSW
2007
126views more  JSW 2007»
13 years 7 months ago
Efficient Evaluation of Multiple-Output Boolean Functions in Embedded Software or Firmware
— The paper addresses software and firmware implementation of multiple-output Boolean functions based on cascades of Look-Up Tables (LUTs). A LUT cascade is described as a means ...
Vaclav Dvorak
PUC
2007
132views more  PUC 2007»
13 years 7 months ago
Kitchen stories: sharing recipes with the Living Cookbook
Research on smart houses has mostly been focused on automation and invisible integration of technology, which may lead to a perceived loss of control and a sense of being observed....
Lucia Terrenghi, Otmar Hilliges, Andreas Butz
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 2 months ago
Streaming Tree Transducers
We introduce streaming tree transducers as an analyzable and expressive model for transforming hierarchically structured data in a single pass. Given a linear encoding of the inpu...
Rajeev Alur, Loris D'Antoni