Sciweavers

392 search results - page 58 / 79
» Reversal Complexity Revisited
Sort
View
ASIACRYPT
2010
Springer
13 years 6 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
VTC
2006
IEEE
100views Communications» more  VTC 2006»
14 years 2 months ago
List Stack Detection with Reduced Search Space for MIMO Communication Systems
The interest in near-ML detection algorithms for Multiple-Input/lMultiple-Output (MIMO) systems have always been high due to their drastic performance gain over suboptimal algorith...
Woon Hau Chin, Sumei Sun
MSE
2000
IEEE
118views Hardware» more  MSE 2000»
14 years 1 months ago
MPEG Video Streaming with VCR Functionality
—With the proliferation of online multimedia content, the popularity of multimedia streaming technology, and the establishment of MPEG video coding standards, it is important to ...
Chia-Wen Lin, Jeongnam Youn, Jian Zhou, Ming-Ting ...
ATAL
2006
Springer
14 years 11 days ago
Automated analysis and verification of agent behavior
Comprehending and analyzing agent behavior is an arduous task due to complexities in agent systems and sophistication of agent behaviors, in addition to the common difficulties wi...
Tibor Bosse, Dung N. Lam, K. Suzanne Barber
IJCAI
1997
13 years 10 months ago
Extracting Propositions from Trained Neural Networks
This paper presents an algorithm for extract­ ing propositions from trained neural networks. The algorithm is a decompositional approach which can be applied to any neural networ...
Hiroshi Tsukimoto