Sciweavers

2938 search results - page 522 / 588
» On obfuscating point functions
Sort
View
IACR
2011
139views more  IACR 2011»
12 years 9 months ago
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN
We revisit meet-in-the-middle attacks on block ciphers and recent developments in meet-in-the-middle preimage attacks on hash functions. Despite the presence of a secret key in the...
Lei Wei, Christian Rechberger, Jian Guo 0001, Hong...
PODS
2009
ACM
124views Database» more  PODS 2009»
14 years 10 months ago
Indexing uncertain data
Querying uncertain data has emerged as an important problem in data management due to the imprecise nature of many measurement data. In this paper we study answering range queries...
Pankaj K. Agarwal, Siu-Wing Cheng, Yufei Tao, Ke Y...
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
14 years 3 months ago
Fractional Order Dynamical Phenomena in a GA
This work addresses the fractional-order dynamics during the evolution of a GA, which generates a robot manipulator trajectory. In order to investigate the phenomena involved in th...
Eduardo José Solteiro Pires, José An...
SODA
2012
ACM
191views Algorithms» more  SODA 2012»
12 years 16 days ago
Submatrix maximum queries in Monge matrices and Monge partial matrices, and their applications
We describe a data structure for submatrix maximum queries in Monge matrices or Monge partial matrices, where a query specifies a contiguous submatrix of the given matrix, and it...
Haim Kaplan, Shay Mozes, Yahav Nussbaum, Micha Sha...
SI3D
1999
ACM
14 years 2 months ago
UniCam - 2D gestural camera controls for 3D environments
We present a novel approach to controlling a virtual 3D camera with a 2D mouse or stylus input device that is based on gestural interaction. Our approach to 3D camera manipulation...
Robert C. Zeleznik, Andrew S. Forsberg