Sciweavers

1414 search results - page 184 / 283
» Randomness and Universal Machines
Sort
View
129
Voted
CP
2000
Springer
15 years 7 months ago
Automatic Generation of Propagation Rules for Finite Domains
plexity Theorems: Talk Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 David McAllester Regular Papers Automatic Generation of Propagation Rules for F...
Slim Abdennadher, Christophe Rigotti
121
Voted
CPM
1998
Springer
115views Combinatorics» more  CPM 1998»
15 years 7 months ago
Aligning Alignments
d abstract) John Kececioglu and Dean Starrett Department of Computer Science The University of Arizona Tucson AZ 85721, USA A basic computational problem that arises in both the...
John D. Kececioglu, Weiqing Zhang
CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
15 years 7 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
122
Voted
EDBT
2009
ACM
164views Database» more  EDBT 2009»
15 years 7 months ago
Efficient identification of starters and followers in social media
Activity and user engagement in social media such as web logs, wikis, online forums or social networks has been increasing at unprecedented rates. In relation to social behavior i...
Michael Mathioudakis, Nick Koudas
117
Voted
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
15 years 7 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata