Sciweavers

858 search results - page 94 / 172
» One Is Enough!
Sort
View
ASIACRYPT
2008
Springer
13 years 11 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
BIOID
2008
119views Biometrics» more  BIOID 2008»
13 years 11 months ago
Some Unusual Experiments with PCA-Based Palmprint and Face Recognition
Abstract. In this paper we describe a number of experiments relating to PCAbased palmprint and face recognition. The experiments were designed to determine the influence of differe...
Ivan Krevatin, Slobodan Ribaric
COLT
2008
Springer
13 years 10 months ago
More Efficient Internal-Regret-Minimizing Algorithms
Standard no-internal-regret (NIR) algorithms compute a fixed point of a matrix, and hence typically require O(n3 ) run time per round of learning, where n is the dimensionality of...
Amy R. Greenwald, Zheng Li, Warren Schudy
CP
2008
Springer
13 years 10 months ago
Optimization of Simple Tabular Reduction for Table Constraints
Abstract. Table constraints play an important role within constraint programming. Recently, many schemes or algorithms have been proposed to propagate table constraints or/and to c...
Christophe Lecoutre
DAMON
2008
Springer
13 years 10 months ago
Critical sections: re-emerging scalability concerns for database storage engines
Critical sections in database storage engines impact performance and scalability more as the number of hardware contexts per chip continues to grow exponentially. With enough thre...
Ryan Johnson, Ippokratis Pandis, Anastasia Ailamak...