Sciweavers

3328 search results - page 57 / 666
» On Plateaued Functions and Their Constructions
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
GEOINFO
2003
13 years 10 months ago
A Strategy for the Interpolation of Surfaces through the Use of Basis Functions
For the construction of digital terrain models based on surface interpolation, it is defined a bivariate function ¡£¢¥¤§¦©¨ that interpolates a finite set of  sample ...
Edson Ricardo de Andrade Silva, Creto Augusto Vida...
ICRA
2008
IEEE
104views Robotics» more  ICRA 2008»
14 years 3 months ago
Towards locally computable polynomial navigation functions for convex obstacle workspaces
— In this paper we present a polynomial Navigation Function (NF) for a sphere world that can be constructed almost locally, with partial knowledge of the environment. The present...
Grigoris Lionis, Xanthi Papageorgiou, Kostas J. Ky...
PKC
2010
Springer
217views Cryptology» more  PKC 2010»
14 years 24 days ago
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Lossy Trapdoor Functions (LTDFs), introduced by Peikert and Waters (STOC 2008) have been useful for building many cryptographic primitives. In particular, by using an LTDF that los...
Petros Mol, Scott Yilek
EVOW
2008
Springer
13 years 10 months ago
Improving Metaheuristic Performance by Evolving a Variable Fitness Function
In this paper we study a complex real world workforce scheduling problem. We apply constructive search and variable neighbourhood search (VNS) metaheuristics and enhance these meth...
Keshav P. Dahal, Stephen Remde, Peter I. Cowling, ...